Product Manual Care for our Environment; ‘It's the right thing to do.’ Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual is made from recycled materials.
Norton™ Internet Security Product Manual The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 20.1 Copyright © 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, LiveUpdate, Norton 360, and Norton are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Portions of this product Copyright 1996-2011 Glyph & Cog, LLC.
Norton License Agreement Norton™ Internet Security IMPORTANTPLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT (“LICENSE AGREEMENT”) CAREFULLY BEFORE USING THE SOFTWARE (AS DEFINED BELOW).
During the Service Period, You may: A. use one copy of the Software on a single Device. If a greater number of copies and/or number of Devices is specified within the Documentation or the applicable transaction documentation from the authorized distributor or reseller from which You obtained the Software, You may use the Software in accordance with such specifications; B.
to protect Symantec against software piracy. This Software may contain enforcement technology that limits the ability to install and uninstall the Software on a Device to not more than a finite number of times for a finite number of Devices. This License Agreement and the Software containing enforcement technology may require activation as further set out in the Documentation. If so, the Software will only operate for a finite period of time prior to Software activation by You.
8. Disclaimer of Damages: SOME STATES AND COUNTRIES DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE BELOWLIMITATIONOREXCLUSIONMAY NOT APPLY TO YOU.
“NOTICE OF CLAIM”. The Notice of Claim should include both the mailing address and email address You would like Symantec to use to contact You. If Symantec elects to seek arbitration, it will send, by certified mail, a written Notice of Claim to Your billing address on file. A Notice of Claim, whether sent by You or by Symantec, must (a) describe the nature and basis of the claim or dispute; and (b) set forth the specific amount of damages or other relief sought ("Demand").
may only be modified by the Documentation or by a written document that has been signed by both You and Symantec. Should You have any questions concerning this License Agreement, or if You desire to contact Symantec for any reason, please write to Symantec Customer Service, 555 International Way, Springfield, OR 97477, U.S.A. or visit the Support page at www.symantec.com. ADDITIONAL TERMS AND CONDITIONS. Your use of the Software is subject to the terms and conditions below in addition to those stated above.
Contents Chapter 1 Getting started ...................................... 13 Activation protects you ............................. About Norton Internet Security main window ........................................... About your Norton Account ........................ About Norton Management ........................ About Norton Community Watch ................. About Norton Bootable Recovery Tool ............................................... About Norton Power Eraser ........................
Contents Chapter 4 Responding to security issues ................ 199 What to do if a security risk is found ........... 199 Chapter 5 Protecting Internet activities ................. 211 About the Smart Firewall ......................... About Download Insight ........................... About Intrusion Prevention ...................... About Vulnerability Protection .................. About the types of security risks ................ About Norton AntiSpam ...........................
Contents 11 Index ..........................................................................
Contents
Getting started 1 This chapter includes the following topics: 1 Activation protects you 1 About Norton Internet Security main window 1 About your Norton Account 1 About Norton Management 1 About Norton Community Watch 1 About Norton Bootable Recovery Tool 1 About Norton Power Eraser 1 Starting Norton Internet Security from the command prompt 1 About the Norton Internet Security icon 1 About LiveUpdate 1 About Network Proxy Settings Activation protects you Product activation protects
Getting started Activation protects you activate the product within a limited time period after you install it. If you are connected to the Internet, product activation takes place automatically when you start the product for the first time after installation. After activation, the Norton Account window appears. You can create your Norton Account and register your product. If you are not connected to the Internet, you can click Try Later in the Activation not complete window to start your product.
Getting started Activation protects you 15 During activation, the Norton Account window appears. You can create your Norton Account and register your product. You can also view details, such as your product key, your registration date, and recent updates to the product. If you skip the Norton Account window, the product is activated, but the product key is not saved in the Norton Account. You can print the product key to reinstall your product in the future.
Getting started Activation protects you Where to find your product key The product key is a unique key that helps you to install and activate the Symantec product on your computer. The product key is a 25-character alphanumeric string that is shown in five groups of five characters each, separated by hyphens. The location of the product key varies depending on how you acquired the product.
Getting started Activation protects you 17 If you received a product key The product key is printed on card the card along with instructions on how to use it. Be sure to save your product key by creating or signing in to your Norton Account. You need the product key if you ever want to reinstall the product. If you are still unable to locate your product key, you can recover it using Norton Account To recover or access your product key log on to https://account.norton.com.
Getting started About Norton Internet Security main window About Norton Internet Security main window The Norton Internet Security main window acts as a security management interface. You can access the main features and monitor the performance of your computer from the main window. You can find the following items in the main window: Settings Lets you access the Settings window. You can view and configure various options to customize the Norton Internet Security settings.
Getting started About Norton Internet Security main window Account Lets you create or access your Norton Account. Norton Account lets you manage all of your Norton products in one place. This feature may not be w available in some versions of Norton Internet Security. Support Lets you access the Norton Autofix window that provides you various support options. You can also access the online Help from the Support drop-down menu.
Getting started About Norton Internet Security main window Scan Now Lets you access different types of scans to protect your computer and your sensitive data. By using the Scan Now option, you can run the following types of scans: 1 Computer Scan 1 Lets you run different computer scans including Quick Scan, Full System Scan, and Custom Scan. Reputation Scan 1 Lets you run different reputation scans including Quick Scan, Full System Scan, and Custom Scan.
Getting started About Norton Internet Security main window Advanced 21 Lets you access the Norton Internet Security advanced window. By using the Norton Internet Security advanced window, you can do the following: 1 1 1 1 1 1 1 1 Run different scans. View Security History. View the quarantined items in the Security History window. View Norton Insight Application Ratings. View the list of programs that are vulnerable on your computer and find how Norton protects you from the program vulnerabilities.
Getting started About Norton Internet Security main window The options on the right side of the Norton Internet Security main window help you do the following: Online Family
Getting started About Norton Internet Security main window Lets you monitor your child’s activities on the Internet. Norton Online Family w may not be available in some versions of Norton Internet Security. When you click the Online Family icon, the Norton Internet Security main window displays Norton Online Family Log in option. Norton Online Family provides you advanced controls to monitor your child's online activities.
Getting started About Norton Internet Security main window Manage Lets you access Norton Management. Norton Management lets you manage your Norton products on all of your devices from one location. Click the Manage icon at the right side of the main window to sign up for or log into Norton Management. The Norton Management agent should be installed on each device that you want to add to Norton Management. You can use your existing Norton Account login information to access Norton Management.
Getting started About Norton Internet Security main window Mobile Lets you download the Norton Mobile Security for Android. You can use Norton Mobile Security on all your devices that use Android operating system. When you click the Mobile icon, the main window displays a Quick Response (QR) code for installing Norton Mobile Security. You can use the Android scan app on your Android device to scan the QR code and install Norton Mobile Security.
Getting started About Norton Internet Security main window Backup Lets you set up the Norton Online Backup account or access your online backup status. Norton Online Backup w may not be available in some versions of Norton Internet Security. When you click the Backup icon, the main window displays Norton Online Backup Log in option.
Getting started About Norton Internet Security main window Safe Web Lets you check the safety of a Web site. You can also perform a safe search. This option may not be w available with some versions of Norton Internet Security. When you click the Safe Web icon, the Norton Internet Security main window displays Norton Safe Web options. You can use the Check Site option to analyze the security levels of any Web site that you want to visit.
Getting started About Norton Internet Security main window Studio Lets you access Norton Studio. Norton Studio is an app that is available on your Windows 8 Apps Store. Norton Studio lets you manage your Norton products and Norton product keys from one location. You can view the security status of each of your devices and resolve the security issues by using the Norton Studio from any location around the world. You can go to Windows 8 App Store and download and install Norton Studio.
Getting started About Norton Internet Security main window The panes are: Computer Protection Provides you the essential computer protection options. It also contains links to scan your computer, view the history of protection events, and manage quarantined items. You can also view the Norton Insight - Application Ratings window and improve the performance of Norton Internet Security scans. In addition, you can run LiveUpdate.
Getting started About Norton Internet Security main window You can view the different protection features on the right side of the window. You can move your mouse pointer over each feature to view a brief summary about the feature. You can also choose to ignore or monitor the protection status of a feature. You can choose to turn on or turn off the protection features from this window.
Getting started About Norton Internet Security main window 31 To respond to System Status indicators from the main window 1 In the bottom section of the Norton Internet Security main window, click Fix Now. 2 Follow the on-screen instructions. Monitoring the protection status of a feature The Norton Internet Security main window acts as a security management interface. You can access the main features and monitor the performance of your computer from the main window.
Getting started About your Norton Account 1 Safe Surfing To monitor the protection status of a feature 1 In the Norton Internet Security main window, click Advanced. 2 In the window that appears, move your mouse pointer over the feature name. 3 In the pop-up that appears, do one of the following: 1 To ignore the protection status of the feature that affects your computer’s overall health evaluation, click Ignore. 1 To monitor the protection status of the feature that has been ignored, click Monitor.
Getting started About your Norton Account 1 33 Any time after activation If you skip the Norton Account window during activation, you can create a Norton Account any time after activation. You can create your Norton Account and register your product from the Account link that appears at the top of the Norton Internet Security main window.
Getting started About your Norton Account Profile Saves your account information and your billing details. The Profile options are: 1 Account Information 1 You can update your Norton Account information and your shipping address on the Account Information tab. After you update, click Update to save the changes. Billing Information 1 You can save your credit card information and your billing address on the Billing Information tab. It makes it easier for saving online orders.
Getting started About your Norton Account Norton Online Backup Norton Online Backup provides a secure and easy-to-use online backup solution that safeguards your important data against system crash, accidental deleting, virus infection, and other disasters. Norton Safe Web Norton Safe Web checks the safety of a Web site and lets you perform a safe Web search. Norton.
Getting started About your Norton Account Creating a Norton Account Your Norton Account stores the product key and the billing information of your product. You can also register your product with the Norton Account. In addition, Norton Account helps you to do the following: 1 Access the product key and other product information when you need it. 1 Reinstall your Norton product. 1 1 1 1 Buy additional product keys for your home or office.
Getting started About your Norton Account 37 To create a Norton Account from the Norton Account Web page 1 In the Norton Internet Security main window, click Account. 2 In the Norton Account Web page that appears, click Sign up now. 3 In the Norton Account Sign Up Web page, provide the details about your account information, and then click Sign Up. To create a Norton Account and register your product after activation 1 In the Norton Internet Security main window, click Account.
Getting started About Norton Management w Symantec products that are older than the 2006 product year do not appear in your Norton Account. To access Norton Account 1 In the Norton Internet Security main window, click Account. 2 In the Web page that appears, type your email address and password, and click Sign In. About Norton Management Norton Management lets you manage all of your Norton products and Norton product keys from one location.
Getting started About Norton Management 1 1 w 39 Activate your product using another product key. Upgrade your Norton products to the latest available version. The features listed above vary for different Norton products and devices. Accessing Norton Management on Windows You can access Norton Management in one of the following ways: 1 Using a Web browser on any computer. 1 From the main window of Norton security products.
Getting started About Norton Management 4 Type your password that you use for Norton Account. 5 Click Go. 6 Click Manage Devices. To access Norton Management from the Windows notification area 1 Go to the Windows device on which Norton Management is installed. 2 In the notification area on the taskbar, click the Norton Management icon. 3 In the pop-up that appears, click Open Norton Management.
Getting started About Norton Management 41 3 Click Sign In and log on to your account using your Norton Account email address and password. 4 On the My Devices page, click Add Device. 5 In the confirmation window, click Yes to confirm that you are already on the device you want to manage. 6 In the window that appears, click Save File and download the installer file. 7 Double-click the file that you downloaded. 8 Click Run.
Getting started About Norton Management 4 If you are prompted to provide your email address, in the Email Address box, type the email address that you use to log on to your Norton Account, and then click Next. 5 If you are prompted to provide your password, in the Password box, type the password that you use to log on to your Norton Account, and then click Next. 6 In the Set up this computer window, in the Name this computer box, type a display name for the device, and then click Finish.
Getting started About Norton Management 43 About the supported devices To install and use Norton Internet Security, your device must meet the following minimum system requirements: Hardware requirement Windows 1 300-MHz or faster processor 1 512 MB of RAM (256 MB minimum) 1 100 MB of available hard disk space Operating systems Platform 1 1 1 1 1 Version Microsoft 32-bit and 64-bit Windows 7 versions Home Basic Microsoft Windows 7 Home Premium Microsoft Windows 7 Professional Microsoft Windows
Getting started About Norton Management 1 1 1 1 1 1 1 Microsoft 32-bit and 64-bit Windows Vista versions Home Basic Microsoft Windows Vista Home Premium Microsoft Windows Vista Ultimate Microsoft Windows Vista Business Service Pack 1 and 2 Microsoft Windows XP Home Microsoft Windows XP Pro Microsoft Windows XP Media Center Edition (2005 and later) Service Pack 2 and 3 32-bit versions Mac 1 OS X 10.7 (Lion) 1 2GB of RAM 1 1.5 GB of available hard disk space Android 1 Android OS 2.
Getting started About Norton Community Watch 45 Supported Norton products To use all the features of Norton Internet Security, you must use the following versions of Norton security product: If you use an older version of Norton product, ensure that you upgrade your product to the latest version to use all the features of Norton Internet Security. w Currently, there are no upgrades available for Norton Anti-Theft and Norton Online Family. Supported browsers 1 Internet Explorer 7.0 or later.
Getting started About Norton Community Watch 1 1 1 1 1 1 1 Identified malicious software such as portable executable files and running processes Any Web site URL that your product identifies as fraudulent All the Web site URLs that you visited before the detection of a risk The applications and processes that run on your computer regularly and during any security risk detection Response instances that your computer sends to any potential security risk General system information and performance a
Getting started About Norton Bootable Recovery Tool 47 If you chose not to join Norton Community Watch when you installed your Norton product, you can turn it on later. To access the Norton Community Watch option, go to the Norton Internet Security main window, and then click Settings > General > Other Settings > Norton Community Watch. You can also review the data, which Norton Community Watch collects and submits to Symantec, in the Security History window.
Getting started About Norton Bootable Recovery Tool Norton Bootable Recovery Tool detects and resolves the following security threats: Viruses Programs that infect another program, boot sector, partition sector, or document by inserting themselves or attaching themselves to that medium. Most viruses just replicate; many also do damage. Trojan horses Programs containing malicious codes that are disguised as or hiding in something benign, such as a game or utility.
Getting started About Norton Bootable Recovery Tool Trackware 49 Programs that track system activity, gather system information, or track user habits, and relay this information to third-party organizations. The information that is gathered by such programs is neither personally identifiable nor confidential. Trackware programs are installed with the user's consent, and may also be packaged as part of other software that is installed by the user.
Getting started About Norton Bootable Recovery Tool You can download Norton Bootable Recovery Tool Wizard in one of the following ways: 1 From the Start menu. 1 From the Norton Support Web site. To download the Norton Bootable Recovery Tool Wizard from the Start menu 1 On the Windows taskbar, do one of the following: 1 In Windows XP, click Start > Programs > Norton Internet Security > Norton Recovery Tools.
Getting started About Norton Bootable Recovery Tool 51 About locating your Norton Product Key or activation PIN To use Norton Bootable Recovery Tool, you must start the computer from any of the following recovery media and then provide your Norton Product Key or the activation PIN when prompted: w 1 Norton Bootable Recovery Tool CD or DVD 1 Norton Bootable Recovery Tool USB key If you already installed and activated any one of the following Norton product on your computer, you do not have to enter t
Getting started About Norton Bootable Recovery Tool 1 1 1 1 1 If you received your Norton product preinstalled by the computer manufacturer, the Product Key is available on your Norton Account. When you are prompted, you need to register for a Norton Account. After you complete registration, you can log on to your Norton Account and find your Product Key. You can also click on the Account link on the main window of your product and register and access Norton Account.
Getting started About Norton Bootable Recovery Tool 53 Creating Norton Bootable Recovery Tool on a CD or DVD Norton Bootable Recovery Tool is integrated with Windows Preinstallation Environment (WinPE). Therefore, you can run Norton Bootable Recovery Tool only from a CD, DVD, or USB key. To use it, you first need to burn it to a CD or DVD. w If you choose to create Norton Bootable Recovery Tool on a re-writable CD or DVD, all the data that are stored in the CD or DVD are permanently deleted.
Getting started About Norton Bootable Recovery Tool Creating Norton Bootable Recovery Tool ISO file You can create a Norton Bootable Recovery Tool ISO file on your computer. You can burn this ISO file to a CD or DVD and use it as a recovery CD or DVD on any computer. You can also use this ISO file to point to any virtual machine as a virtual CD-ROM. To create Norton Bootable Recovery Tool ISO file 1 In the Norton Bootable Recovery Tool Wizard main window, click Create ISO file.
Getting started About Norton Bootable Recovery Tool 55 To create Norton Bootable Recovery Tool on a USB key 1 Insert the USB key into the USB port of your computer. 2 In the Norton Bootable Recovery Tool Wizard main window, click Create on USB key. 3 In the Create on USB key window, do the following: 1 Select the USB drive from the Specify drive drop-down list. 1 If you want to add drivers, click Add next to Add drivers. 1 If you want to change the default language, click Change next to Specify language.
Getting started About Norton Bootable Recovery Tool If you have a valid Norton product key or activation PIN, you can go to your Norton Account and access the Norton Bootable Recovery Tool download link. To access your Norton Account, go to the following address: https://account.norton.com To access Norton Bootable Recovery Tool Wizard 1 Do one of the following: 1 Double-click the Norton Bootable Recovery Tool Wizard icon on your computer desktop.
Getting started About Norton Bootable Recovery Tool 57 Norton Bootable Recovery Tool automatically downloads the latest virus definitions from Symantec servers and uses these virus definitions to secure your computer from all types of viruses and latest security threats. If Dynamic Host Configuration Protocol (DHCP) is enabled, virus definitions are automatically updated when your computer is connected to the Internet.
Getting started About Norton Bootable Recovery Tool 4 Read the Norton License Agreement, type your Product Key, and then click I Agree. If you use a non-QWERTY keyboard, use the Virtual Keyboard option to enter your Product Key. 5 In the Norton Bootable Recovery Tool window, click Norton Advanced Recovery Scan. 6 In the Scan section, click Start Scan.
Getting started About Norton Power Eraser 59 To update Norton Bootable Recovery Tool virus definitions on a USB key 1 Insert your Norton Bootable Recovery Tool USB key into the USB port of your computer. 2 In the Norton Bootable Recovery Tool Wizard main window, click Update USB key definitions. 3 In the Update USB key definitions window, from the Specify drive drop-down list, select the USB drive. 4 Click Next. 5 Review the results and click Done.
Getting started About Norton Power Eraser 2 In the page that appears, click Download Norton Power Eraser. 3 Save the NPE.exe file to your Desktop. 4 Double-click the NPE.exe file on your Desktop. 5 Read the license agreement, and then click Accept. Scanning your computer with Norton Power Eraser You can scan your computer with Norton Power Eraser to remove threats even if you have a Symantec security product.
Getting started Starting Norton Internet Security from the command prompt 61 Starting Norton Internet Security from the command prompt If you work from the command line (for example, writing a script or code), you can start Norton Internet Security while you are still in DOS. To start Norton Internet Security from the command prompt 1 At the command-line prompt, type the directory where Norton Internet Security is located, and the executable.
Getting started About the Norton Internet Security icon and notifications appear over the notification area of your computer. In most cases, you can click the link available in the alert to view the details and fix the problems. The Norton Internet Security icon represents the current state of your computer. The icon changes its color when it actively fixes any issues or wants to inform you about any warning or urgent issues.
Getting started About the Norton Internet Security icon 63 About Norton Internet Security shortcut menu Norton Internet Security performs background activities to keep your computer secure. The icon in the notification area reassures you that your protection is up to date. The icon changes its color if any change in status occurs. The messages that appear in the notification area might require a response from you, such as opening a window, and taking an action.
Getting started About LiveUpdate Turn on/Turn off Silent Mode Lets you turn on or turn off Silent Mode. Disable/Enable Smart Firewall Lets you turn off or turn on the firewall. Disable/Enable Antivirus Lets you turn off or turn on Auto-Protect Antivirus Auto-Protect. Check for New Version Lets you check if new version of your product is available or not. This option is available only if you have activated your product and you have an active subscription.
Getting started About LiveUpdate 65 download the latest updates. To configure the proxy settings of your network, go to the Norton Internet Security main window, and then click Settings > Network > Network Security Settings > Proxy Server > Configure. w LiveUpdate does not download the latest definition updates and program updates, if the Network Cost Awareness option in the Settings window is set to No Traffic.
Getting started About LiveUpdate The type of definition updates that each of the Symantec products receive are as follows: Norton AntiVirus, Norton AntiVirus Online Users of these products receive the latest virus definitions from Symantec that protects your computer from all types of security threats. Norton Internet Security, Norton In addition to the virus Internet Security Online and security risk updates, users of these products receive definition updates for security protection.
Getting started About LiveUpdate 67 Norton 360, Norton 360 Online Users of these products receive the latest virus definitions from Symantec that protects your computer from all types of security threats. In addition, users of these products receive Symantec spam definition files and definition updates against phishing. Norton Security Suite, Norton Business Suite Users of these products receive the latest virus definitions from Symantec that protects your computer from all types of security threats.
Getting started About LiveUpdate Core Set Contains the most important virus definitions that are required for latest security threats as viewed by Symantec. The Core Set is a subset of the Complete Set, and it is approximately 30 percent smaller than the Complete Set. The Core Set minimizes download time, installation time, and system start time. It also occupies lesser amount of disk space as compared to the Complete Set virus definitions.
Getting started About LiveUpdate 69 As the Smart Definitions are of considerably smaller size, it results in lesser download time, lesser installation time, lesser boot time, and lesser memory consumption. It also occupies lesser amount of disk space as compared to the full set of virus definitions. Therefore, Smart Definitions result in faster performance of your computer. Norton Internet Security checks the Smart Definitions option settings during each LiveUpdate session.
Getting started About LiveUpdate These downloads are called Pulse Updates. The Pulse Updates are lighter and faster than Automatic LiveUpdate. It keeps your computer secure from the ongoing threats on the World Wide Web. When Pulse Updates are enabled, LiveUpdate checks for definition updates every few minutes and downloads the streamed virus definitions. The Pulse Updates protect your computer from the latest security threats without compromising your system performance.
Getting started About LiveUpdate 71 updates periodically, which are enhancements to the product. Program updates are usually created to fix program errors, improve the performance of the program, or, to extend the operating system or hardware compatibility. After you install program updates, you might not necessarily see a difference in the way that the product works. If you are not connected to the Internet, connect to the Internet first, and then run LiveUpdate.
Getting started About LiveUpdate you can acquire the product and maintain your status are as follows: If you purchased a subscription version of a retail product The product includes a limited-time subscription to definition updates. When the subscription is due to expire, you are prompted to renew. Follow the on-screen instructions to complete your subscription renewal. After your product expires, you cannot obtain updates of any kind and all the security features are turned off.
Getting started About LiveUpdate 73 run LiveUpdate manually to obtain updates if you have turned off the Automatic LiveUpdate option. w If you are connected to the Internet, Automatic LiveUpdate downloads product updates and definition updates every hour. If you have an Integrated Services Digital Network (ISDN) router that is set to automatically connect to your Internet service provider (ISP), it may incur charges each time.
Getting started About LiveUpdate Turning on or turning off Apply updates only on reboot LiveUpdate obtains latest definition updates and the program updates that keep your computer secure from the latest security threats. Definition updates contain the information that allows Norton Internet Security to recognize and alert you to the presence of a specific virus or a security threat. Certain program updates require system restart for the update to complete.
Getting started About LiveUpdate 75 4 In the Settings window, click Apply. 5 Click OK. About Pulse Updates In addition to the definition updates that Automatic LiveUpdate downloads, Norton Internet Security uses streaming technology to download the latest virus definitions. These downloads are called Pulse Updates. The Pulse Updates are lighter and faster than Automatic LiveUpdate. They keep your computer secure from the ongoing threats that exist on the Internet.
Getting started About Network Proxy Settings You must be connected to the Internet to obtain latest definition updates by using Pulse Updates. You can turn on or turn off Pulse Updates only if Automatic LiveUpdate is turned on. To turn off or turn on Pulse Updates 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, in the left pane, click Updates.
Getting started About Network Proxy Settings 77 PAC file contains the code that lets your browser know about the proxy settings for different Web sites over the Internet. It also contains the words which you want to filter and block while you access the Internet. You can also choose the option that lets your browser to automatically detect the proxy settings. If you want your manual settings in the network, ensure that you disable the Automatic Configuration options.
Getting started About Network Proxy Settings Proxy Settings Lets you provide the details of your Proxy Settings. Under Proxy Settings, check Use a proxy server for your HTTP connections, and do the following: 1 1 In the Address box, type the URL or IP address of your proxy server. In the Port box, type the port number of your proxy server. You can specify a value from 1 to 65535. Authentication Lets you connect to the Internet through a server that requires authentication.
Getting started About Network Proxy Settings 79 5 In the Network Proxy Settings window, do the following: 1 If you want your browser to automatically detect network connection settings, under Automatic Configuration, check Automatically detect settings. 1 If the proxy server requires an automatic configuration URL, under Automatic Configuration, check Use automatic configuration script. Type the URL of the PAC file in the URL box.
Getting started About Network Proxy Settings
Monitoring your system's performance 2 This chapter includes the following topics: 1 About System Insight About System Insight Norton Internet Security continuously monitors your computer to keep it free of any problems and run at peak efficiency. Norton Internet Security constantly scans the vital areas of your computer including memory, registry keys, and running processes. It monitors the important activities such as general file operation, network traffic, and Internet browsing.
Monitoring your system's performance About System Insight 1 1 1 disk optimizations, threat detections, performance alerts, or Quick Scans. The graph displays the activities as icon or stripe, and the description for each icon or stripe is provided at the bottom of the graph. The pop-up that appears when you move the mouse pointer over an icon provides you the details about the activity.
Monitoring your system's performance About System Insight 1 83 The Norton Tasks window provides the details such as the timestamp, the duration, and the status of the background jobs. The details also include the type of power the job needs to run and if a job ran during idle time. You can select different power sources for the background jobs. You can also start or stop a background job at any time. To view the details of the Files of Interest.
Monitoring your system's performance About System Insight window. The Events graph at the top of the Performance window displays each activity as icon or stripe. The description for each icon or stripe appears at the bottom of the graph. You can use the tabs at the top of the graph to obtain details for the current month and for the last two months.
Monitoring your system's performance About System Insight Detections Provides the details about the threat detection activities that Norton Internet Security performed on your system over a period of the last three months. The details include the date on which Norton Internet Security detected a threat and the total number of threats that Norton Internet Security detected on that date. The View Details link provides additional details about the risk such as the risk impact and the origin of the risk.
Monitoring your system's performance About System Insight Quick Scans Provides the details about Quick Scans that Norton Internet Security performed on your system over a period of the last three months. The details include the date on which a Quick Scan was performed and the number of Quick Scans that were performed on that date. The View Details link provides additional details such as the scan time, total items scanned, total risk detected, total risks resolved, and recommended action.
Monitoring your system's performance About System Insight 87 To view details of your system activities 1 In the Norton Internet Security main window, click Performance. 2 In the Performance window, at the top of the Events graph, click the tab for a month to view the details. 3 In the Events graph, move the mouse pointer over the icon or the stripe for an activity. 4 In the pop-up that appears, view the details of the activity.
Monitoring your system's performance About System Insight exceeds the defined threshold limit, Norton Internet Security alerts you with a performance alert. You can use the Resource Threshold Profile for Alerting option to configure the threshold limit. To access the Resource Threshold Profile for Alerting option, go to the Norton Internet Security main window, and then click Settings > General > Performance Monitoring > Resource Threshold Profile for Alerting.
Monitoring your system's performance About System Insight You can use the following options to configure performance alerts: Off Turns off performance alerts. Select this option if you do not want Norton Internet Security to notify you with performance alerts. On Turns on performance alerts. Select this option if you want Norton Internet Security to notify you with performance alerts when a program or process exceeds the threshold limit of the system resource usage.
Monitoring your system's performance About System Insight To configure performance alerts 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the General tab. 3 In the left pane, click Performance Monitoring. 4 Under Performance Monitoring, in the Performance Alerting row, do one of the following: 1 To turn off performance alerts, move the Performance Alerting switch to the Off position.
Monitoring your system's performance About System Insight 91 your system resource, Norton Internet Security notifies you with a performance alert. To configure the resource threshold profile 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the General tab. 3 In the left pane, click Performance Monitoring.
Monitoring your system's performance About System Insight minimum resource usage. By reducing resource usage, your computer gains longer battery life and becomes more energy efficient. You can configure a low threshold profile and ensure that all programs consume minimum resource usage. When the resource usage of a program or a process exceeds the low threshold limit, Norton Internet Security notifies you with a performance alert.
Monitoring your system's performance About System Insight 93 Excluding programs from performance alerts Norton Internet Security lets you exclude programs from performance alerts. You can add the programs that consume high CPU, memory, or disk usage to the Program Exclusions list. When you add a program to the Program Exclusions list, Norton Internet Security does not alert you when the program exceeds the resource consumption threshold limit.
Monitoring your system's performance About System Insight 2 In the Settings window, click the General tab. 3 In the left pane, click Performance Monitoring. 4 Under Performance Monitoring, in the Program Exclusions row, click Configure. 5 In the Program Exclusions window, select the program that you want to delete, and then click Remove. To remove all the programs available in the Program Exclusions window, click Remove All. 6 In the Program Exclusions window, click Apply 7 Click OK.
Monitoring your system's performance About System Insight 95 graph for the last 10 minutes. If you select the 1D option, Norton Internet Security displays a historical data of the last one day. When you click at any point on the CPU graph or memory graph, Norton Internet Security displays a list of the processes that consume maximum resources at that point. It also displays the percentage of usage for each process.
Monitoring your system's performance About System Insight graph for the last 10 minutes. If you select the 1W option, Norton Internet Security displays the CPU graph and memory graph for the last one week. w By default, the graphs display performance time for the last 90 minutes. To view CPU graph and memory graph 1 In the Norton Internet Security main window, click Performance. 2 In the Performance window, do one of the following: 1 To view the CPU graph, click the CPU tab.
Monitoring your system's performance About System Insight 97 Identifying resource-consuming processes You can click at any point on the CPU graph or memory graph to obtain a list of top three processes that consume maximum resources of your computer at that point. You can click a process that is available in the list to get more information about the process in the File Insight window. To identify resource-consuming processes 1 In the Norton Internet Security main window, click Performance.
Monitoring your system's performance About System Insight 1 Windows System files (.sys) 1 Dynamic link library files (.dll) 1 ActiveX control files (.ocx) Norton Internet Security displays the community usage details under the following conditions: 1 1 When the Norton Community Watch option is turned on. See “Turning off or turning on Norton Community Watch” on page 454. When the Network Cost Awareness option is configured to No Limit or Economy.
Monitoring your system's performance About System Insight 1 1 1 w 99 When you update a program that can possibly reset all startup settings to default. When you use another program to manage your startup programs. When you edit the registry keys manually. To add a startup item, you can open your Startup folder that is available in your Windows Start menu and add programs as required.
Monitoring your system's performance About System Insight 3 In the Startup Manager window, in the On/Off column, select the program that you want to automatically start when you turn on your computer. 4 Click Apply. 5 Click Close. Managing startup items Norton Internet Security Startup Manager monitors and lists the programs that automatically start when you turn on your computer.
Monitoring your system's performance About System Insight 101 About optimization The data storage space on a disk is divided into discrete units. These units are called clusters. When files are written to the disk, they are broken up into cluster-sized pieces. When all of the file pieces are located in adjacent or contiguous clusters, the file can be accessed quickly. Your computer’s hard disk stores all of your files, applications, and the Windows operating system.
Monitoring your system's performance About System Insight application on your computer. The optimization process starts next time when your computer is idle. You can use the Idle Time Optimizer option to optimize the boot volume during the idle time. To access the Idle Time Optimizer option, go to the Norton Internet Security main window, and then click Settings > General > Norton Tasks > Idle Time Optimizer.
Monitoring your system's performance About System Insight 103 2 In the Performance window, at the top of the security status graph, click Optimize. To optimize your boot volume from the Norton Tasks window 1 In the Norton Internet Security main window, click Performance. 2 In the Performance window, click Norton Tasks. 3 In the Norton Tasks window, under the Norton Tasks column, click the play icon that appears before Insight Optimizer.
Monitoring your system's performance About System Insight Turning off or turning on Idle Time Optimizer Norton Internet Security automatically schedules the optimization when it detects the installation of a new application on your computer. Norton Internet Security runs this optimization only when your computer is idle. You can use the Idle Time Optimizer option to optimize the boot volume during idle time. By default, this option is turned on.
Monitoring your system's performance About System Insight 1 1 1 1 1 1 105 The name of the Norton task You can use the icon that appears before the name of a background job to start or stop a background task. You can start or stop a background task at any time. The timestamp of the Norton task You can view details such as the date on which the background job last ran and the time.
Monitoring your system's performance About System Insight The Norton Tasks window lets you monitor the following Norton-specific tasks: Automatic LiveUpdate Automatic LiveUpdate automatically checks for definition updates and program updates when your computer is connected to the Internet. By default, Automatic LiveUpdate checks for updates every hour. Full System Scan Scans your entire computer for viruses, spyware, and different security vulnerabilities.
Monitoring your system's performance About System Insight Norton Insight Allows the smart scanning of files on your computer. It improves the performance of Norton Internet Security scans by letting you scan fewer files without compromising the security of your computer. Norton Insight lets you check the details of the Files of Interest that are available on your computer. You can view details such as signature of the file and the date on which the file was installed.
Monitoring your system's performance About System Insight Quick Scan Scans the important locations of your computer that the viruses and other security threats often target. Quick Scan takes less time to scan than a Full System Scan because this scan does not scan your entire computer. The following grayed out categories of jobs run in the background to improve your system performance and protection. You can only view the last run details for the following activities.
Monitoring your system's performance About System Insight Product Maintenance 109 Performs background maintenance tasks related to Norton Internet Security. Tasks include clearing install logs and rescanning consolidated firewall rule. You can also manually turn on Silent Mode for a specified duration.
Monitoring your system's performance About System Insight 4 Do one of the following: 1 To run a background job, click the play icon that appears before the name of the background job. 1 To stop a running background job, click the stop icon that appears before the name of the background job. 5 Click Close. About Power Source You can choose the power source for Norton Internet Security to perform the Norton Tasks when the computer is idle.
Monitoring your system's performance About System Insight External and Battery 111 Allows the Norton Tasks to run irrespective if the computer uses external power or battery power. If you choose this option, Norton Internet Security performs the Norton Tasks when the computer is idle. It does not consider the type of power source the computer uses. You can configure the power source for each of the Norton Tasks.
Monitoring your system's performance About System Insight 4 In the Power Source window, select one of the following: 1 External Allows the Norton Task to run only when your computer uses external power. 1 External and Battery Allows the Norton Task to run irrespective if the computer uses external power or battery power. If you choose this option, Norton Internet Security performs the Norton Task when the computer is idle. It does not consider the type of power source the computer uses. 5 Click OK.
Monitoring your system's performance About System Insight The Whitelist technique Norton Internet Security obtains specific information about the Files of Interest and submits the information to Symantec during idle time. The information includes things such as file name, file size, and hash key. Symantec analyzes the information of each File of Interest and its unique hash value and provides a confidence level to the file.
Monitoring your system's performance About System Insight Symantec assigns the following confidence levels to Files of Interest: Trusted Symantec analyzes the file as trusted based on the statistical evaluation that is done on the files that are available within the Norton Community. If the file has three green bars, Symantec rates the file as Norton Trusted. The files that have three green bars display a Norton Trusted pop-up text when you move the mouse pointer over the green bars.
Monitoring your system's performance About System Insight 115 Norton Internet Security also provides different profiles to configure your scan performance. When you use the Full Scan profile, Norton Internet Security follows the Blacklist technique to scan your computer. It scans all of the files on your computer against the signatures that it obtained during definition updates.
Monitoring your system's performance About System Insight The drop-down list that is available in the Norton Insight - Application Ratings window provides you the following options: All Running Processes Lists the processes that run on your computer at that point in time when you selected this option. All Files Lists the Files of Interest. Startup Items Lists the programs that start when you start your computer.
Monitoring your system's performance About System Insight User Trusted Files 117 Lists the Files of Interest that you manually trusted in the File Insight window. This category does not list the files that do not belong to the File of Interest even if you manually trust the files. However, Norton Internet Security excludes all of the manually trusted files from Norton Internet Security scan when you configure Scan Performance Profiles to High Trust.
Monitoring your system's performance About System Insight To view the files using Norton Insight 1 In the Norton Internet Security main window, click Advanced. 2 In the Computer Protection pane, click Application Ratings. 3 In the Norton Insight - Application Ratings window, select an option from the Show drop-down list to view a category of files. You may need to scroll the window to view all the files that are listed in the details area. 4 Click Close.
Monitoring your system's performance About System Insight 119 Insight - Application Ratings window. However, you can use the Check Trust Now option in the File Insight window to update the trust value of a file. You can also manually trust any well-known files. You can change the trust level of any file to User Trusted other than the files that are Norton Trusted. You can determine the resource usage of a file that is available on your computer.
Monitoring your system's performance About System Insight To find the location of the file 4 In the File Insight window, click Locate. To refresh the trust level of the file 4 In the File Insight window, click Check Trust Now. To manually trust the file 4 In the File Insight window, in the Details tab, click Trust Now. You can manually trust the files that are poor, unproven, or not Norton trusted.
Monitoring your system's performance About System Insight 1 1 121 The complete scan includes a scan of all files on your computer irrespective of the confidence level or digital signature of the files. Configure to Standard Trust to perform a scan that excludes the files that are Norton Trusted. Norton Internet Security scans the files that have a confidence level other than Norton Trusted.
Monitoring your system's performance About System Insight To configure Scan Performance Profiles from the Norton Insight - Application Ratings window 1 In the Norton Internet Security main window, click Advanced. 2 In the window that appears, in the Computer Protection pane, click Application Ratings. 3 In the Norton Insight - Application Ratings window, move the Scan Performance Profiles slider to one of the settings. Your options are: 1 Full Scan 1 Standard Trust 1 High Trust 4 Click Close.
Monitoring your system's performance About System Insight 123 Norton Internet Security provides reports based on the following categories: Computer Lets you view the details of the various attacks your computer is protected from. For example, you can view the total number of viruses and spyware from which you are protected. Network Lets you view the various types of Internet attacks from which you are protected. For example, you can view the total number of intrusion attempts that are blocked.
Monitoring your system's performance About System Insight To view the Monthly Report 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the General tab. 3 In the left pane, click Other Settings. 4 In the Monthly Report row, click View Report. 5 View the report and close the window.
Protecting your files and data 3 This chapter includes the following topics: 1 About maintaining protection 1 About the Norton Internet Security scans About maintaining protection After you have installed your product and run LiveUpdate, you have complete protection from viruses and other security risks. However, new security risks are a constant threat. Security risks can spread when you start your computer from an infected disk or when you run an infected program.
Protecting your files and data About maintaining protection 1 1 1 1 1 1 Run LiveUpdate regularly to receive new program updates. Keep Auto-Protect turned on at all times to prevent viruses from infecting your computer. Watch for email messages from unknown senders. Do not open attachments from these senders. Keep Email Protection turned on to avoid sending or receiving infected email attachments. Keep all recommended maximum protection settings turned on.
Protecting your files and data About maintaining protection 127 2 In the Settings window, in the Computer tab, move the On/Off switch to the left to the On position for the following settings: Computer Scan Computer Scan provides the following options: 1 Compressed Files Scan 1 Microsoft Office Automatic Scan 1 Rootkits and Stealth Items Scan 1 Network Drives Scan Real Time Protection Real Time Protection provides the following options: 1 Antispyware 1 Auto-Protect 1 Caching 1 Removable Media Scan 1 SO
Protecting your files and data About the Norton Internet Security scans 5 In the Smart Firewall section, in the Smart Firewall row, move the On/Off switch to the left to the On position.
Protecting your files and data About the Norton Internet Security scans 129 activities that are performed on your computer to protect your computer from the Internet-based threats that exploit software vulnerabilities. Norton Internet Security automatically performs different types of scans to secure your computer from latest threats. It also lets you run different types of scans manually to secure your computer.
Protecting your files and data About the Norton Internet Security scans Insight Network Scan Insight Network Scan uses the virus definitions that are available locally and hosted in the Cloud. Insight Network Scan detects the files that are suspicious or vulnerable on your computer using the reputation-based threat detection. Norton Internet Security performs an Insight Network Scan only when the Insight Protection option is turned on. By default, the Insight Protection option is turned on.
Protecting your files and data About the Norton Internet Security scans Reputation Scan Reputation Scan displays the reputation information of the files on your computer. It displays the reputation information such as trust level, prevalence, stability rating, and resource usage. Reputation Scan displays the detailed reputation information of the good files and the number of bad files that have been detected or removed.
Protecting your files and data About the Norton Internet Security scans Scan Facebook Wall Scan Facebook Wall lets you scan the links and URLs that are available on your Facebook profile. When you click the Scan Facebook Wall option, Norton Internet Security takes you to the Facebook login Web page. After you log in to your Facebook profile, Norton Safe Web asks you to grant permission to access your Facebook wall.
Protecting your files and data About the Norton Internet Security scans 133 Accessing Norton Internet Security scans You can use Norton Internet Security scans to secure your computer from all types of viruses and unknown threats. You can access Full System Scan and custom scans from the Norton Internet Security main window. You can access Quick Scan from the Norton Internet Security main window or the Norton Internet Security icon on the taskbar.
Protecting your files and data About the Norton Internet Security scans To access the scan from the notification area 4 In the notification area on the taskbar, right-click the Norton Internet Security icon, and then click Run Quick Scan. By default, Insight Protection option is turned on. In this case, Norton Internet Security performs an Insight Network Quick Scan simultaneously with a traditional Quick Scan.
Protecting your files and data About the Norton Internet Security scans 135 If you suspect that your computer is infected, you can run three types of computer scans manually to prevent virus infections on your computer. You can run the following types of computer scans: Quick Scan Scans the important locations of your computer that the viruses and other security threats often target. Quick Scan takes less time to scan than a Full System Scan because this scan does not scan your entire computer.
Protecting your files and data About the Norton Internet Security scans Custom Scan Scans a specific file, folder, drive, or removable drive that you choose. Computer Scan provides details about the scanned items. You can view the details such as total number of files scanned, security risks detected, security risks resolved, and the total items that require attention. It also provides you the different ways to resolve any items that were not automatically resolved during the scan.
Protecting your files and data About the Norton Internet Security scans 137 2 In the Computer Scan pane, click Full System Scan. You can use the following options to suspend a Full System Scan: Pause Suspends a Full System Scan temporarily. Click Resume to continue the scan. Stop Terminates a Full System Scan. Click Yes to confirm. 3 On the Results Summary window, do one of the following: 1 If no items require attention, click Finish.
Protecting your files and data About the Norton Internet Security scans 2 In the Computer Scan pane, click Quick Scan. You can use the following options to suspend a Quick Scan: Pause Suspends a Quick Scan temporarily. Click Resume to continue the scan. Stop Terminates a Quick Scan. Click Yes to confirm. 3 On the Results Summary window, do one of the following: 1 If no items require attention, click Finish. 1 If any items require attention, review the risks on the Threats Detected window.
Protecting your files and data About the Norton Internet Security scans 139 3 In the Scans window, do one of the following: 1 To scan specific drives, click Run next to Drive Scan, select the drives that you want to scan, and then click Scan. 1 To scan specific folders, click Run next to Folder Scan, select the folders that you want to scan, and then click Scan. 1 To scan specific files, click Run next to File Scan, select the files that you want to scan, and then click Add.
Protecting your files and data About the Norton Internet Security scans computer. Viruses, spyware, and other risks often target these areas. If your most recent scan was a Full System Scan, this window shows the results of a comprehensive scan of your entire computer.
Protecting your files and data About the Norton Internet Security scans 141 About custom scans You can create a custom scan if you regularly scan a particular segment of your computer. This custom scan lets you scan the segment frequently without having to specify it every time. You can also schedule the custom scan to run automatically on specific dates and times or at periodic intervals. You can schedule a scan according to your preferences.
Protecting your files and data About the Norton Internet Security scans 5 On the Scan Items tab, add the items that you want to scan. See “Selecting the scan items” on page 142. 6 On the Scan Schedule tab, set the frequency and time at which you want to perform the scan. See “Scheduling a scan” on page 146. 7 On the Scan Options tab, configure the scan options as required. See “Configuring the scan options” on page 143. 8 Click Save.
Protecting your files and data About the Norton Internet Security scans 143 4 In the window that appears, on the Scan Items tab, do the following: 1 To add drives, click Add Drives, in the Scan Drives dialog box, select the drives to be scanned, and click Add. 1 To add folders, click Add Folders, in the Scan Folders dialog box, select the folders to be scanned, and click Add. 1 To add files, click Add Files, in the Files to Scan dialog box, select the files to be scanned, and then click Add.
Protecting your files and data About the Norton Internet Security scans 3 In the Scans window, in the Edit Scan column, click the edit icon next to the scan that you want to schedule. 4 In the Edit Scan window, on the Scan Options tab, configure the scan options as required. 5 Click Save. Editing a custom scan You can edit a custom scan that you created. You can include additional files or folders to the scan or remove the files and folders that you do not want to scan.
Protecting your files and data About the Norton Internet Security scans 145 To run a custom scan 1 In the Norton Internet Security main window, click Scan Now. 2 In the Computer Scan pane, click Custom Scan. 3 In the Scans window, click Run next to the custom scan that you want to run. You can use the following options to suspend a custom scan: Pause Suspends a custom scan temporarily. Click Resume to continue the scan. Stop Terminates a custom scan. Click Yes to confirm.
Protecting your files and data About the Norton Internet Security scans 4 Click Yes to confirm that you want to delete the scan. About scheduling scans Norton Internet Security automatically detects the idle state of your computer and runs a Full System Scan. However, you can schedule a Full System Scan according to your preferences. You can also set up a schedule for a Quick Scan and custom virus scans that you create.
Protecting your files and data About the Norton Internet Security scans w 147 Norton Internet Security lets you select multiple dates if you schedule a monthly scan. To schedule a custom scan 1 In the Norton Internet Security main window, click Scan Now. 2 In the Computer Scan pane, click Custom Scan. 3 In the Scans window, in the Edit Scan column, click the edit icon next to the custom scan that you want to schedule.
Protecting your files and data About the Norton Internet Security scans 6 Under After scan completion:, select the state at which your computer should be after the scan is complete. Your options are: 1 Stay On 1 1 1 Turn Off Sleep This option works only if you have configured the power options in your computer using the Windows Control Panel. Hibernate This option works only if you have configured the power options in your computer using the Windows Control Panel. 7 Click Next.
Protecting your files and data About the Norton Internet Security scans 149 5 Click Next. 6 In the Scan Options tab, click Save. Scheduling a Quick Scan Quick Scan scans the important locations of your computer that the viruses and other security threats often target. When you perform a Quick Scan, Norton Internet Security scans only the running processes and the loaded programs. Quick Scan takes less time to scan than a Full System Scan because this scan does not scan your entire computer.
Protecting your files and data About the Norton Internet Security scans To edit a scheduled scan from Norton Internet Security Scans dialog box 1 In the Norton Internet Security main window, click Scan Now. 2 In the Computer Scan pane, click Custom Scan. 3 In the Scans window, in the Edit Scan column, click the edit icon next to the scan that you want to edit. 4 In the Edit Scan window, on the Scan Schedule tab, change the schedule as required.
Protecting your files and data About the Norton Internet Security scans /B[+|-] Enables (+) or disables (-) boot record scanning and master boot record scanning (for example, NAVW32 C: /B+ or NAVW32 C: /B-) /BOOT Scans only the boot records /QUICK Runs a Quick Scan /SE[+|-] Enables (+) or disables (-) a Quick Scan /ST[+|-] Enables (+) or disables (-) scanning of stealth items [folder_path]\*[?] Scans the files that matches specified wild card [drive|folder|file] Scans the specified drive, fold
Protecting your files and data About the Norton Internet Security scans To run a scan from the command prompt 1 At the command prompt, type the path in which Norton Internet Security is located and the executable's file name. The following examples show the syntax of a scan command: 1 "\Program Files\Norton Internet Security\Engine\version\NAVW32" /command_name Where version represents the version number of Norton Internet Security and command_name represents the command.
Protecting your files and data About the Norton Internet Security scans 153 Protection > On. By default, the Insight Protection option is turned on. When the Insight Protection option is turned on, Norton Internet Security performs a traditional scan and an Insight Network scan simultaneously. The traditional scan uses the definitions from the local system, and the Insight Network scan uses the definitions that are hosted in the Cloud.
Protecting your files and data About the Norton Internet Security scans 1 w perform this scan by running an Insight Network scan on single file using the Custom Scan option on the Scans window. Insight Network context-menu scan When you right-click a file, the shortcut menu displays Norton Internet Security and then Insight Network Scan. You can use this command to scan a file using both local definitions and definitions that are hosted in the Cloud.
Protecting your files and data About the Norton Internet Security scans 155 4 In the Insight Protection row, do one of the following: 1 To turn off Insight Protection, move the On/Off switch to the right to the Off position. 1 To turn on Insight Protection, move the On/Off switch to the left to the On position. 5 In the Settings window, click Apply. About Reputation Scan Reputation Scan provides information on the trust-worthiness of all programs and processes running on your computer.
Protecting your files and data About the Norton Internet Security scans Scan, it also performs a Computer Scan. Norton Internet Security uses the Computer Scan to perform the signature-based threat detection. It compares the signature of the filtered reputation files against the known threat signatures to identify threats on your computer. If a security threat is detected, Norton Internet Security automatically removes the threat from your computer.
Protecting your files and data About the Norton Internet Security scans System files This category includes Windows System files (.sys), dynamic link library files (.dll), and device driver files (.drv). Developer files This category includes ActiveX control files (.ocx). Miscellaneous files This category includes Windows Installer Package files (.msi) and resource-only DLL files (.loc).
Protecting your files and data About the Norton Internet Security scans Full System Scan Scans all the Files of Interest that are available on your computer. When you perform a Full System Scan, Norton Internet Security searches for Files of Interest on all the locations on your computer. The locations include all drives, running processes, loaded programs, and startup files. Custom Scan Scans a specific file, folder, drive, or removable drive.
Protecting your files and data About the Norton Internet Security scans Poor 159 Symantec has a few indications that the file is not trusted. This file is suspicious and can harm your computer. Bad Symantec has a high indication that the file is not trusted. This file is suspicious and can harm your computer. When the Reputation Scan is complete, you can view the summary of the scan results in the Norton Reputation Scan window.
Protecting your files and data About the Norton Internet Security scans 4 If there is a file with Poor or Bad trust level, under the Trust Level column, click the red cross (x) icon. 5 In the Quarantine File window, click Quarantine this file. 6 In the Manual Quarantine window, click Add. 7 Click Close. 8 In the Norton Reputation Scan window, click Close. Running a Reputation Quick Scan When you perform a Quick Scan, Norton Internet Security scans only the running processes and the loaded programs.
Protecting your files and data About the Norton Internet Security scans 161 check the trust level of a specific file, you can scan the particular file. To run a Reputation custom scan 1 In the Norton Internet Security main window, click Scan Now. 2 In the window that appears, click Reputation Scan. 3 In the Reputation Scan pane, click Custom Scan. 4 In the Reputation Custom Scan window, do one of the following: 1 Click Drive Scan, select the drive that you want to scan, and then click Scan.
Protecting your files and data About the Norton Internet Security scans When you run a Reputation Quick Scan, Norton Internet Security considers the Files of Interest which include running processes and loaded programs. When you run a Reputation Full System Scan, Norton Internet Security considers all the Files of Interest that are available on your computer. When you run a Reputation custom scan, Norton Internet Security lets you select the drive, folder, or file that you want to scan.
Protecting your files and data About the Norton Internet Security scans 1 w 163 The Norton Network graph displays the details about the known good files and bad files. You can view the number of trusted files that are on your computer. You can also view the total number of files that Symantec analyzes within the Norton Community. Your computer must be connected to the Internet to view these details. Norton Internet Security connects to the Symantec servers to collect the reputation information.
Protecting your files and data About the Norton Internet Security scans Trust Level
Protecting your files and data About the Norton Internet Security scans Indicates the trust level that is assigned to a file. Symantec analyzes specific information about a file such as the digital signature and the hash value to determine the trust level of a file. Symantec rates a file based on the statistical evaluation that is done on the file using the Norton Community Watch data and Symantec’s analysis.
Protecting your files and data About the Norton Internet Security scans suspicious file. Community Usage Indicates the community usage level of the file. The search results are grouped in to the following categories: 1 1 1 Very Few Users: Shows the files that have very low community usage. Few Users: Shows the files that have average community usage. Many Users: Shows the files that have very high community usage.
Protecting your files and data About the Norton Internet Security scans Resource Usage Indicates the system resource usage level of the file. The usage levels are as follows: 1 1 1 1 Low: Indicates that the file consumes minimum system resources. Moderate: Indicates that the file consumes moderate system resources. High: Indicates that the file consumes maximum system resources. Unknown: Indicates that the file has performed no action in your computer.
Protecting your files and data About the Norton Internet Security scans Stability Indicates the stability rating of the file. The stability rating depends on how frequently the program crashes. The different stability ratings are as follows: 1 1 1 1 1 1 Reliable: Indicates that the program is reliable. Stable: Indicates that the program is comparatively stable. However, it crashes sometimes. Slightly Unstable: Indicates that the program is slightly unstable.
Protecting your files and data About the Norton Internet Security scans 169 can also let other Facebook users know the security status of any Web site. However, Norton Safe Web requires your permission to scan the URLs that are available on your Facebook Wall. When you install the Norton Safe Web Facebook App, Norton Safe Web App asks for your permission to access your Facebook Wall. You can choose to allow or deny permission to let Norton Safe Web access your Facebook Wall.
Protecting your files and data About the Norton Internet Security scans The following are the safety states that Norton Safe Web provides after it scans the links on your Facebook Wall: Safe Indicates that the site is safe to visit and Norton Trusted. The sites with this rating do not harm your computer and so you can visit this site. Warning Indicates that the site has security risks. The sites with this rating may install malicious software on your computer.
Protecting your files and data About the Norton Internet Security scans 171 To enable your Facebook Wall 1 In the Norton Internet Security main window, click Scan Now. 2 In the window that appears, click Scan Facebook Wall. 3 In the Scan Facebook Wall pane, click Scan My Facebook Wall. 4 In the Facebook login Web page, log in to your Facebook profile. 5 In the Request for permission page, click Allow. 6 In the Web page that appears, click Please grant us permission to access your News Feed and Wall.
Protecting your files and data About the Norton Internet Security scans The following list provides details on the settings that you can make and the predefined parameters: Idle Time Out duration You can set the duration after which Norton Internet Security should identify your computer as idle. You can select a value (in minutes) between 1 minute and 30 minutes.
Protecting your files and data About the Norton Internet Security scans 173 Norton Internet Security discontinues any Idle Time Scans that it started during idle time if you begin to use your computer again. However, it resumes the scan when your computer is idle again. w You must turn off Idle Time Scans to schedule a Full System Scan. However, you should always keep Idle Time Scans turned on to allow Norton Internet Security to scan your computer when it becomes idle.
Protecting your files and data About the Norton Internet Security scans 3 In the Idle Time Scans row, in the drop-down list, select the option that you want to set. Your options are: 1 Weekly 1 Monthly 1 Quarterly 4 Click Apply. Specifying Idle Time Out duration You can set the duration after which Norton Internet Security should identify your computer as idle. You can select a value (in minutes) between 1 minute and 30 minutes.
Protecting your files and data About the Norton Internet Security scans w 175 Symantec recommends that your computer remains connected to Internet to get the real-time protection against threats and proactively detects unknown security risks on your computer. SONAR monitors your computer for malicious activities through heuristic detections. SONAR automatically blocks and removes high-certainty threats. Norton Internet Security notifies you when high-certainty threats are detected and removed.
Protecting your files and data About the Norton Internet Security scans 3 In the SONAR Protection row, do one of the following: 1 To turn off SONAR Protection, move the On/Off switch to the right to the Off position. 1 To turn on SONAR Protection, move the On/Off switch to the left to the On position. 4 In the Settings window, click Apply.
Protecting your files and data About the Norton Internet Security scans w 177 Exclude a program from Norton Internet Security scans only if you are confident that the program is safe. For example, if another program relies on a security risk program to function, you might decide to keep the program on your computer.
Protecting your files and data About the Norton Internet Security scans About Signature Exclusions Norton Internet Security lets you select specific known security risks and exclude them from Norton Internet Security scans. Exclude a risk from Norton Internet Security scans only if you have a specific need. For example, if another program relies on a security risk program to function, you might decide to keep the program on your computer.
Protecting your files and data About the Norton Internet Security scans 179 To add a signature to the Signature Exclusions 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, in the left pane, click AntiVirus and SONAR Exclusions. 3 In the Signatures to Exclude from All Detections row, click Configure. 4 In the Signature Exclusions window, click Add. 5 In the Security Risks window, click on a security risk that you want to exclude and then click Add.
Protecting your files and data About the Norton Internet Security scans w When you exclude a reputation-based threat, Norton Internet Security does not add the signature of the excluded threat to the Signature Exclusions window. This is because the reputation-based threats are excluded by hash value. You can use the Clearing IDs of files that are excluded during scans option to clear the excluded reputation-based threats. To clear the reputation information of files that are excluded from scans.
Protecting your files and data About the Norton Internet Security scans 181 3 In the Clear file IDs excluded during scans row, click Clear All. 4 In the Warning window, click Yes. 5 In the Settings window, click Apply, and then click OK. About scanning Office documents Norton Internet Security protects all Office documents that you receive through email messages, through Internet download, and through inserted floppy disks or other removable media.
Protecting your files and data About the Norton Internet Security scans Turning on or turning off Microsoft Office Automatic Scan Norton Internet Security maintains a higher level of security by automatically scanning all Office files. You can turn on the Microsoft Office Automatic Scan option to protect your computer against the virus macros and embedded objects. To Turn on or turn off Microsoft Office Automatic Scan 1 In the Norton Internet Security main window, click Settings.
Protecting your files and data About the Norton Internet Security scans 183 Norton Internet Security provides the following options under Silent Mode Settings: Silent Mode Norton Internet Security allows you to manually turn on for a specified duration using Silent Mode option. Full Screen Detection Norton Internet Security turns on this option automatically when it detects a full-screen application and turns off when you stop using the full-screen application.
Protecting your files and data About the Norton Internet Security scans You can view the summary of the Silent Mode sessions under the Recent History, Full History, and Silent Mode categories in the drop-down list of the Show option in the Security History window.
Protecting your files and data About the Norton Internet Security scans 185 Turning on or turning off Silent Mode manually You can manually turn on Silent Mode for a specified duration before you perform any important task on your computer. You can turn on Silent Mode for a period of one hour, two hours, four hours, six hours, or one day. The Norton Internet Security icon displays the turn-on status of Silent Mode in the notification area, at the far right of the taskbar.
Protecting your files and data About the Norton Internet Security scans 6 Click OK. To turn on Silent Mode from the notification area 1 In the notification area on the Windows taskbar, right-click the Norton Internet Security icon, and then click Turn on Silent Mode. 2 In the Turn on Silent Mode dialog box, in the Select the duration drop-down list, select how long you want to turn on Silent Mode, and then click OK.
Protecting your files and data About the Norton Internet Security scans 187 notifications and suspends background activities to provide uninterrupted sessions for Silent Mode options such as Full Screen Detection or Media Center applications. Turning off or turning on Full Screen Detection You can use the Full Screen Detection option in the Settings window to turn on or turn off Silent Mode automatically when Norton Internet Security detects a full-screen application.
Protecting your files and data About the Norton Internet Security scans background activities and lets the task use the maximum resources for better performance. You can choose to set Norton Internet Security to automatically enable Quiet Mode when you do the following tasks: 1 IMAPI 2.
Protecting your files and data About the Norton Internet Security scans 189 The following table explains about the various options: IMAPI 2.0 Disk Burn When you use a Media Center application to burn a CD or a DVD, Norton Internet Security automatically enables Quiet Mode, if the IMAPI 2.0 Disk Burn option is turned on. By default, the IMAPI 2.0 Disk Burn option is turned on.
Protecting your files and data About the Norton Internet Security scans Media Center TV Recording When you use a Media Center application to record a TV program, Norton Internet Security automatically enables Quiet Mode, if the Media Center TV Recording option is turned on. By default, the Media Center TV Recording option is turned on. When Quiet Mode is enabled, Norton Internet Security suspends background activities to improve the performance of your TV program recording session.
Protecting your files and data About the Norton Internet Security scans 191 User-Specified Programs Norton Internet Security automatically turns on Quiet Mode when it detects a TV program recording session or a disk-burning session. In addition, you can manually add the programs for which you want Norton Internet Security to turn on Quiet Mode to the Quiet Mode Programs list.
Protecting your files and data About the Norton Internet Security scans only after the TV program recording session or disk-burning session is complete. You cannot turn off Quiet Mode during the sessions by using the options in the Settings window. To turn off or turn on IMAPI 2.0 Disk Burn 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the General tab. 3 In the left pane, click Silent Mode Settings.
Protecting your files and data About the Norton Internet Security scans 193 About User-Specified Programs Norton Internet Security automatically turns on Quiet Mode when it detects a TV program recording session or a disk-burning session. In addition, you can manually add the programs for which you want Norton Internet Security to turn on Quiet Mode to the Quiet Mode Programs list.
Protecting your files and data About the Norton Internet Security scans Quiet Mode. Norton Internet Security turns on Quiet Mode the next time when you execute the program. You can only add the programs that have .exe file extension to the Quiet Mode Programs list. To add a program 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the General tab. 3 In the left pane, click Silent Mode Settings.
Protecting your files and data About the Norton Internet Security scans 195 4 Under Quiet Mode on Detection of, in the User-Specified Programs row, click Configure. 5 In the Quiet Mode Programs window, select the program that you want to delete, and then click Remove. 6 In the confirmation dialog box, click Yes. 7 In the Quiet Mode Programs window, click Apply and then click OK.
Protecting your files and data About the Norton Internet Security scans 1 Off Turns off boot time protection. If you turn off the Enable Boot Time Protection option, the protection level of your computer reduces. Configuring boot time protection The boot time protection feature provides enhanced security level from the time you start your computer. As soon as you start your computer, Norton Internet Security starts Auto-Protect and all required drivers and plug-ins start functioning.
Protecting your files and data About the Norton Internet Security scans 197 click Settings > Computer > Real Time Protection > Early Launch Anti-Malware Protection > On. By default this option is turned off. w This option is available only on Windows 8. Turning on or turning off Early Launch Anti-Malware Protection The Early Launch Anti-Malware Protection feature provides enhanced security level during the boot time when you start your computer.
Protecting your files and data About the Norton Internet Security scans
Responding to security issues 4 This chapter includes the following topics: 1 What to do if a security risk is found What to do if a security risk is found Your product provides many solutions and features for handling viruses and other security threats that it detects. When Norton Internet Security detects a security risk on your computer, you must take appropriate action on the risk. Norton Internet Security notifies you when it detects a security risk.
Responding to security issues What to do if a security risk is found risk. You can access the Symantec Security Response Web site and refer the manual removal instructions. In some cases, Norton Internet Security might not identify an item as a security threat, but you might suspect that the item is infected. In such cases, you can submit the item to Symantec for further analysis. In addition, your product provides solutions for security risks, such as spyware and adware.
Responding to security issues What to do if a security risk is found 201 You can view information about detected viruses and other security threats in Security History. Security History also includes information about spyware, adware, and other security risks. Reviewing Auto-Protect notifications Auto-Protect scans files for viruses, worms, and Trojan horses when you perform an action with them, such as moving them, copying them, or opening them.
Responding to security issues What to do if a security risk is found 3 In the Show drop-down list, select the category for which you want to review Auto-Protect alerts. Your options are: Recent History Review Auto-Protect notifications that you received in the last seven days. Full History Review all of the Auto-Protect notifications that you have received. Resolved Security Risks Review all of the resolved security threats.
Responding to security issues What to do if a security risk is found 203 4 In the right pane, click the Options link. The option name appears as Restore & Options for few items. If one or more security risks such as spyware are found, you can take action on these items, if required.
Responding to security issues What to do if a security risk is found 5 In the Threat Detected window, select the appropriate action on the risk. The following are some of the options that are available in the Threat Detected window: Restore & Exclude this file Returns the selected Quarantine item to its original location and excludes the item from being detected in the future scans. This option is available for the detected viral and non-viral threats.
Responding to security issues What to do if a security risk is found Remove this file (may cause browser to close) Removes the selected security risk from the computer and quarantines it. This option is available for the security risks that require your attention for manual removal. This option is also available for the security risks that are manually quarantined. Remove from history Removes the selected security risk item from the Security History log.
Responding to security issues What to do if a security risk is found Submit to Symantec Sends the security risk to Symantec. In some cases, Norton Internet Security might not identify an item as a security threat, but you might suspect that the item is infected. In such cases, you can use this option to submit the item to Symantec for further analysis. Responding to Worm Blocking alerts If a program tries to email itself or a copy of itself, it could be a worm trying to spread through email.
Responding to security issues What to do if a security risk is found 207 To respond to Worm Blocking alerts 4 In the alert window, select the action that you want to take. Your options are: Quarantine Permanently stops the worm by putting it in Security History. While in Security History, the worm is unable to spread. This Quarantine is the safest action. Allow Sends the email message for which you have received the worm blocking alert.
Responding to security issues What to do if a security risk is found 2 After the worm has been quarantined, perform the following tasks: 1 Run LiveUpdate to ensure that you have the latest definition updates. See “About Program and Definition Updates” on page 65. 1 Scan your computer. See “Running a Full System Scan” on page 136. If nothing is detected, submit the infected file to Symantec Security Response.
Responding to security issues What to do if a security risk is found 209 checks for the infections that have processes running in memory. It also checks for the infections that the start-up files and folders refer. If that does not work, read the information on the Threats Detected window to identify the types of files that cannot be repaired. You can take one of the following actions, depending on the file type: Infected files You can view the file type of the detected risk.
Responding to security issues What to do if a security risk is found To resolve the suspected security risk 4 Save all open files, and then click Go. If you do not respond to this dialog box, it closes automatically without resolving and closing the suspected security risk.
Protecting Internet activities 5 This chapter includes the following topics: 1 About the Smart Firewall 1 About Download Insight 1 About Intrusion Prevention 1 About Vulnerability Protection 1 About the types of security risks 1 About Norton AntiSpam 1 About configuring POP3 and SMTP ports 1 About the Network Security Map 1 About Network Cost Awareness About the Smart Firewall The Smart Firewall monitors the communications between your computer and other computers on the
Protecting Internet activities About the Smart Firewall Internet.
Protecting Internet activities About the Smart Firewall 213 remains protected, you can turn on the Smart Firewall manually before the time that you specify concludes. When the Smart Firewall is turned off, your computer is not protected from Internet threats and security risks. To turn off Smart Firewall 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the Network tab. 3 In the left pane, click Smart Firewall.
Protecting Internet activities About the Smart Firewall To turn on Smart Firewall from the notification area 4 In the notification area on the taskbar, right-click the Norton Internet Security icon, and then click Enable Smart Firewall. About firewall rules A firewall is a security system that uses rules to block or allow connections and data transmission between your computer and the Internet.
Protecting Internet activities About the Smart Firewall 215 For example, you have a Program rule for the Symantec pcAnywhere application that blocks the use of the application with any other computer. You add another rule for the same application that allows its use with a specific computer. You then move the new rule before the original rule in the program rule list. Norton Internet Security processes the new rule first and lets you use Symantec pcAnywhere with that specific computer.
Protecting Internet activities About the Smart Firewall Default Allow Inbound NetBIOS Permit the use of the Name (Shared Networks) NetBIOS name service and the NetBIOS Default Allow Inbound NetBIOS datagram service that the (Shared Networks) Microsoft Network uses in file and printer sharing. NetBIOS is an acronym for Network Basic Input/Output System. NetBIOS provides name service, session service, and datagram service.
Protecting Internet activities About the Smart Firewall 217 You can add a new General rule in this window. You can also do the following activities: Modify a General rule You can change the settings of a General rule that does not function the way you want. However, you cannot modify some of the default rules that are read-only. See “Modifying General rules and Program rules” on page 233. Turn off a General rule You can disable a General rule.
Protecting Internet activities About the Smart Firewall The Program Control window displays a list of programs. In this window, you can do the following: 1 Add a program. 1 Rename a program. 1 Modify the rules for a program. 1 Add a rule for a program. 1 Modify the access settings of a program rule. 1 Modify the priority of rules for a program by changing the sequence of rules in the list. Remove a program rule. 1 Remove a program. 1 View the trust level of a program.
Protecting Internet activities About the Smart Firewall Respond to alerts 219 Lets the firewall notify you when a program attempts to access the Internet. You can then allow or block Internet access for the program. In some instances, such as when you watch a movie, you might prefer not to be alerted with any messages. In such cases, you can turn on Automatic Program Control. Norton Internet Security does not prompt you with any firewall alerts in this state.
Protecting Internet activities About the Smart Firewall for the first time, an alert prompts you to configure access settings. When you turn off Automatic Program Control, a warning appears. Symantec recommends that Automatic Program Control remain set to Aggressive. By turning it off, you might make the incorrect decisions that can allow malicious programs to run or block critical Internet programs and functions.
Protecting Internet activities About the Smart Firewall 221 Adding a program to Program Control You can add a program to Program Control to control their ability to access the Internet. When you add the program, you can configure its access settings in Program Control. You can allow, block, or create the custom rules that are specific to the program that you add. Manually configured Firewall settings for programs override any settings that Automatic Program Control makes.
Protecting Internet activities About the Smart Firewall 9 In the Options drop-down list, select the access level that you want this program to have. Your options are: Allow Always Allow all access attempts by this program. Block Always Deny all access attempts by this program. Manually configure Create the rules that control how this program accesses the Internet.
Protecting Internet activities About the Smart Firewall 223 do not want them in the current version, you must remove them again. To remove a program from Program Control 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the Network tab. 3 In the left pane, click Smart Firewall. 4 Under Smart Firewall, in the Program Control row, click Configure. 5 In the Program Control window, in the Program column, select the program that you want to remove. 6 Click Remove.
Protecting Internet activities About the Smart Firewall 6 In the drop-down list next to the program that you want to change, select the access level that you want this program to have. Your options are: Allow Allow all access attempts by this program. Block Deny all access attempts by this program. Custom Create the rules that control how this program accesses the Internet. 7 Click OK.
Protecting Internet activities About the Smart Firewall 225 7 Follow the instructions in the Add Rule wizard. 8 In the General Rules window, click OK. 9 In the Advanced Settings window, click OK. To add a Program rule 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the Network tab. 3 In the left pane, click Smart Firewall. 4 Under Smart Firewall, in the Program Control row, click Configure.
Protecting Internet activities About the Smart Firewall 2 In the first panel of the Add Rule Wizard, select the action that you want for this rule. Your options are: Allow Allow communication of this type. For example, consider a General rule with the following criteria: all inbound connections from Internet address 192.168.1.1 through port 8080. When you select Allow, Smart Firewall allows all connections satisfying the criteria of this General rule. Block Prevent communication of this type.
Protecting Internet activities About the Smart Firewall Monitor Update the Firewall – Activities category in the event log each time that communication of this type takes place. This option lets you monitor how often this firewall rule is used. Norton Internet Security notifies you every time that the traffic matching the monitor rule criteria passes through your computer. You can use the links in these notifications to view the logs.
Protecting Internet activities About the Smart Firewall 4 Select the type of connection for the rule. Your options are: Connections to other computers The rule applies to outbound connections from your computer to another computer. Connections from other computers The rule applies to inbound connections from another computer to your computer. Connections to and from other The rule applies to computers inbound and to outbound connections.
Protecting Internet activities About the Smart Firewall 229 5 Click Next, and then select the computers that apply to the rule. Your options are: Any computer The rule applies to all computers. Any computer in the local subnet This rule applies only to computers in the local subnet. An organization’s network is divided into subnets to facilitate efficient Internet communications. A subnet represents all of the computers in the same LAN.
Protecting Internet activities About the Smart Firewall Only the computers and sites listed below The rule applies only to the computers, sites, or domains that you specify. You can specify the names and addresses of computers that apply to the rule. The details of the specified computers appear in the list. You can also remove computers from the list. When you select this option, the Add option becomes available.
Protecting Internet activities About the Smart Firewall 6 Click Next, and then select the protocols for the rule. Your options are: TCP The rule applies to TCP (Transmission Control Protocol) communications. UDP The rule applies to UDP (User Datagram Protocol) communications. TCP and UDP The rule applies to TCP and to UDP communications. ICMP The rule applies to ICMP (Internet Control Message Protocol) communications. This option is available only when you add or modify a General rule.
Protecting Internet activities About the Smart Firewall All The rule applies to all supported protocols. When you select this option, you cannot specify the types of communications or ports that apply to the rule. 7 Select the ports for the rule. Your options are: All types of communication (all The rule applies to ports, local and remote) communications that use any port. Only communications that The rule applies to the match all types and ports listed ports that you specify.
Protecting Internet activities About the Smart Firewall 233 8 Click Next. 9 Check Create a Security History log entry if you want Norton Internet Security to create an entry in the firewall event log. Norton Internet Security creates an entry when a network communication event matches this rule. You can view the event log in the Security History window under Firewall – Activities.
Protecting Internet activities About the Smart Firewall 5 In the Advanced Settings window, in the General Rules row, click Configure. 6 In the General Rules window, select the rule that you want to change. 7 Click Modify. 8 In the Modify Rule window, make the necessary changes to modify any aspect of the rule. 9 When you have finished changing the rule, click OK. 10 In the General Rules window, click OK. 11 In the Advanced Settings window, click OK.
Protecting Internet activities About the Smart Firewall 235 Changing the order of firewall rules Each list of firewall rules is processed from the top down. You can adjust how the firewall rules are processed by changing their order. w Do not change the order of the default General rules unless you are an advanced user. Changing the order of default General rules can affect firewall functionality and reduce the security of your computer.
Protecting Internet activities About the Smart Firewall 5 In the Program Control window, in the Program column, select the program that contains the rule that you want to move. 6 Click Modify. 7 In the Rules window, select the rule that you want to move. 8 Do one of the following: 1 To move this rule before the rule above it, click Move Up. 1 To move this rule after the rule below it, click Move Down. 9 When you are done moving the rules, click OK. 10 In the Program Control window, click OK.
Protecting Internet activities About the Smart Firewall 237 Removing a firewall rule You can remove some of the firewall rules if necessary. However, you cannot remove some of the default General rules that appear in the list. You can view the settings of these rules by using the View option. w Do not remove a firewall rule unless you are an advanced user. Removing a firewall rule can affect firewall functionality and reduce the security of your computer.
Protecting Internet activities About the Smart Firewall 6 Click Modify. To remove all the program rules that are associated with the program, click Remove. 7 In the Rules window, select the rule that you want to remove. 8 Click Remove. 9 In the Confirmation dialog box, click Yes. 10 When you are done removing rules, click OK. 11 In the Program Control window, click OK. 12 Click OK.
Protecting Internet activities About the Smart Firewall Block All Network Traffic 239 Lets you configure how Norton Internet Security must control the network communications to and from your computer. For instance, you may have to be away from your system for a very long time. During this period, you want to secure your system by not allowing it to communicate with the other computers on the network.
Protecting Internet activities About the Smart Firewall list or remove a program from the list. Your options are: Trust Displays the trust level of a program. Symantec collects the information from the Norton Community. Symantec assigns the following trust levels: 1 1 1 1 1 Norton Trusted: Indicates the file that is Norton Trusted. Good: Symantec has high indications that the file is trusted. Unproven: Symantec does not have enough information about the file to assign a trust level to the file.
Protecting Internet activities About the Smart Firewall Access 241 Displays the level of access that the program has. You can change the access level by selecting a different entry from the drop-down list. Your options are Allow, Block, and Custom. Add Lets you add a program to Program Control manually. Modify Opens the Rules window, in which you can customize rules for a selected program. Remove Lets you remove a selected program from Program Control.
Protecting Internet activities About the Smart Firewall 1 1 1 1 1 View the details of the devices that are present in the network. Monitor the connection status of the devices that are present in the network. View the security status of your network connection. View the security status of each computer that you remotely monitor. View the Trust Control status of all the devices that are on your Network Security Map.
Protecting Internet activities About the Smart Firewall Firewall Reset 243
Protecting Internet activities About the Smart Firewall Returns the Smart Firewall to its default state. You can click Reset to ensure that all recommended firewall rules and settings are configured. Norton Internet Security prompts you with a confirmation dialog box when you reset firewall. If you reset the firewall, you remove any custom rules or settings that you have configured.
Protecting Internet activities About the Smart Firewall 1 Stealth Blocked Ports address range Your computer must be connected to a secure wireless or wired connection Ensures that blocked and inactive ports do not respond to connection attempts. Prevents the active ports from responding to connection attempts with incorrect source or destination information. Stateful Protocol Filter Automatically allows the Internet traffic that matches the connections that an application opens.
Protecting Internet activities About the Smart Firewall Automatic File/Printer Sharing Control
Protecting Internet activities About the Smart Firewall Allows the computers on the network to share resources such as files, folders, and printers (that are locally attached). Some of the Windows 7 and Windows 8 features such as Home Media Experience work only when the trust level of the network to which your computer is connected is set to Shared or Full Trust.
Protecting Internet activities About the Smart Firewall new network to which your computer is connected as Shared or Protected. The prompt appears only when the security criteria for sharing matches.
Protecting Internet activities About the Smart Firewall Automatic Program Control 249
Protecting Internet activities About the Smart Firewall Automatically configures Internet access settings for the Web-enabled programs that are run for the first time. You can configure the Automatic Program Control option to the following settings: 1 1 Aggressive - Allows Norton Internet Security to alert you when it detects a program with Unproven or Poor trust level receiving inbound traffic.
Protecting Internet activities About the Smart Firewall 1 decisions when a program receives inbound or outbound traffic. When you select this option, Norton Internet Security does not prompt you with any firewall alerts. Off - Turns off Automatic Program Control. If you have selected this option, you must manually specify the Internet access settings for all inbound traffic and outbound traffic in the firewall alerts.
Protecting Internet activities About the Smart Firewall When you turn off Automatic Program Control, you can turn on Advanced Events Monitoring. You can use the Advanced Events Monitoring options, to configure the Internet access settings for Internet-enabled programs the first time that they run. When you turn on the Advanced Events Monitoring feature, you are prompted with numerous firewall alerts. If you do not want to receive firewall alerts, you can set Automatic Program Control to Automatic.
Protecting Internet activities About the Smart Firewall 1 Program Component 1 This option protects you against the malicious programs that launch Internet-enabled programs. Program Launch 1 This option protects you against the malicious programs that attach to safe programs without being detected. Command Line Execution 1 This option protects you against the Trojan horses or malicious programs that launch trusted applications in hidden mode through-command line parameters.
Protecting Internet activities About the Smart Firewall 1 Internet without firewall alerts. Direct Network Access This option protects you against the Trojan horses and other malicious programs that bypass network traffic. 1 1 These programs penetrate the Windows TCP/IP layer to send and receive data without triggering firewall alerts.
Protecting Internet activities About the Smart Firewall 1 255 COM Control This option protects you against the malicious programs that manipulate an application's behavior by instantiating controlled COM objects. About Norton Firewall Diagnosis There may be times when firewall may block the network traffic that you want to allow based on its configuration settings. In such cases, you may have issues in accessing the Internet, the Network, or another computer to perform tasks such as sharing resources.
Protecting Internet activities About the Smart Firewall 1 1 1 The traffic has violated the traffic policy of the firewall The traffic comes from the restricted zone of networks or computers The traffic matches an Intrusion Prevention attack signature You can use the Firewall Diagnostics Wizard as a guide to troubleshoot the network connection problem by yourself. For each case of network block, the Wizard contains the firewall’s analysis of the cause and the possible solutions to fix the block.
Protecting Internet activities About the Smart Firewall 257 make definite decisions on whether to allow or block communication attempts of networking applications. In addition, you can identify any suspicious programs or vulnerable programs that attempt to access your communication network. When Automatic Program Control is set to Aggressive or Automatic, Norton Internet Security automatically configures Internet access settings for all Web-enabled programs the first time they run.
Protecting Internet activities About the Smart Firewall reputation-based security technology provides reputation ratings for files on the Internet based on the information that is collected from Norton customers. Norton Internet Security obtains specific information such as file name and hash key about the file and sends this information to the Symantec server. Symantec analyzes the file information and provides a trust level for the file.
Protecting Internet activities About the Smart Firewall 259 In the left pane of the firewall alerts, you can find the following reputation information: Stability Shows the stability rating of the file on your computer. The stability rating depends on how frequently the program crashes. The different stability ratings are as follows: 1 Reliable 1 Indicates that the program is reliable. Stable 1 Indicates that the program is comparatively stable. However, it crashes sometimes.
Protecting Internet activities About the Smart Firewall Prevalence Shows the user prevalence of the file. This data is based on the information that millions of Norton Community Watch customers shared and Symantec's research analysis. The different categories are: 1 Very Few Users 1 Indicates that the file has very low user prevalence. Few Users 1 Indicates that the file has average user prevalence. Many Users Indicates that the file has high user prevalence.
Protecting Internet activities About the Smart Firewall Trust Level Shows the trust level of the file. Symantec assigns the following trust levels: 1 1 1 1 1 Norton Trusted Indicates the file that is Norton Trusted. Good - Symantec has high indications that the file is trusted. Unproven - Symantec does not have enough information about the file to assign a trust level to the file. The file is neither safe nor unsafe. Poor - Symantec has only a few indications that the file is not trusted.
Protecting Internet activities About Download Insight About Download Insight Download Insight provides information about the reputation of any executable file that you download from the supported portals. The reputation details indicate whether the downloaded file is safe to install. You can use these details to decide the action that you want to take on the file.
Protecting Internet activities About Download Insight 1 UseNext (Download Manager) 1 FDM (Download Manager) 1 Adobe Acrobat Reader (PDF viewer) 263 Based on the type of portal you use to download your file, Norton Internet Security does one of the following: 1 1 Analyzes the file based on its reputation details when the download is complete. Analyzes the file based on its reputation details when the file is accessed.
Protecting Internet activities About Download Insight Unknown Includes the files that are neither safe nor unsafe. Unknown files have unproven reputation. These files might harm your computer. In the case of an unknown file, Download Insight notifies you that it is unsure of the reputation level of the file. You can use the View Details link in the notifications to view more details of the file.
Protecting Internet activities About Download Insight Cancel run 265 Lets you cancel the installation of the executable program. Remove this file from my Lets you remove the file from system your computer. Security History logs details of all events that Download Insight processes and notifies. It also contains information about the safety level of the file and the action that you take on the file, if any. You can view these details in the Download Insight category in Security History.
Protecting Internet activities About Download Insight You can use the Download Intelligence option to turn off or turn on Download Insight. To turn off Download Intelligence 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the Web tab. 3 In the left pane, click Download Intelligence. 4 In the Download Intelligence row, move the On/Off switch to the right to the Off position. 5 In the Settings window, click Apply.
Protecting Internet activities About Download Insight 1 267 Notifies you only when you download a file that is infected with a local virus identification. If the file that you download is infected with a cloud virus identification, Norton Internet Security removes the file from your computer and notifies you with the threat details. When the Download Insight Notifications option is set to Risks Only, Download Insight notifies only when you download an infected or a suspicious executable file.
Protecting Internet activities About Download Insight Configuring the Show Report on Launch of Files option The Show Report on Launch of Files option lets you specify when and for what type of file you want to be prompted to select a suitable action. For example, you can specify the type of downloaded files for which Download Insight asks you to decide what to do with the file and how frequently these prompts for a suitable action must appear.
Protecting Internet activities About Download Insight Unproven Files Only When you set the Show Report on Launch of Files option to Unproven Files Only, Download Insight prompts you to select a suitable action for unknown files only. In this case, the Download Insight window appears whenever you try to launch any downloaded file that has an unknown reputation score. In this window, you can view details about the file and the options that let you select a suitable action for the file.
Protecting Internet activities About Download Insight Never When you set the Show Report on Launch of Files option to Never, Download Insight does not prompt you to select a suitable action for any type of file that you download. In this case, the Download Insight window does not appear whenever you try to launch any downloaded file. However, if the Alert on Poor Stability option is turned on, Download Insight prompts you to select a suitable action when you try to download an unstable file.
Protecting Internet activities About Download Insight 271 4 Under Download Intelligence, in the Show Report on Launch of Files row, do one of the following: 1 If you want Download Insight to prompt you for a suitable action in case of safe and unknown files, move the Show Report on Launch of Files switch to the Always position.
Protecting Internet activities About Intrusion Prevention To turn on or turn off Alert on Poor Stability 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the Web tab. 3 In the left pane, click Download Intelligence. 4 Under Download Intelligence, in the Alert on Poor Stability row, do one of the following: 1 To turn on Alert on Poor Stability, move the On/Off switch to the left to the On position.
Protecting Internet activities About Intrusion Prevention 273 If you are sure that a device on your network is safe, you use the Edit Device Trust Level window to change the trust level of the device to Full Trust. You can then select the Exclude from IPS scanning option to exclude these trusted devices from Intrusion Prevention scan. Intrusion Prevention relies on an extensive list of attack signatures to detect and block suspicious network activity.
Protecting Internet activities About Intrusion Prevention 6 Click OK. To turn off or turn on an individual Intrusion Prevention notification 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the Network tab. 3 In the left pane, click Intrusion Prevention. 4 Under Intrusion Prevention, in the Intrusion Signatures row, click Configure. 5 In the Intrusion Signatures window, click an attack signature, and then click Properties.
Protecting Internet activities About Intrusion Prevention 275 5 In the Intrusion Signatures window, uncheck the attack signatures that you want to exclude. 6 Click OK. To include the attack signatures that were previously excluded 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the Network tab. 3 In the left pane, click Intrusion Prevention. 4 Under Intrusion Prevention, in the Intrusion Signatures row, click Configure.
Protecting Internet activities About Intrusion Prevention To turn off or turn on AutoBlock 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the Network tab. 3 In the left pane, click Intrusion Prevention. 4 Under Intrusion Prevention, in the Intrusion AutoBlock row, click Configure. 5 In the Intrusion AutoBlock window, under AutoBlock, do one of the following: 1 To turn off Intrusion AutoBlock, click Off.
Protecting Internet activities About Intrusion Prevention 277 5 In the Intrusion AutoBlock window, under Computers currently blocked by AutoBlock, do one of the following: 1 To unblock one computer, select its IP address, and then click Unblock. 6 Click OK. Permanently blocking a computer that has been blocked by AutoBlock You can permanently block a computer that AutoBlock has blocked.
Protecting Internet activities About Intrusion Prevention Scanning every request from all the devices that access your computer increases the scan time which slows down the network speed of your computer. If you are sure that a device on your network is safe, you can change the trust level of the device to Full Trust. You can configure the trust level of a device using the Network Security Map. You can exclude these trusted devices from Intrusion Prevention scan.
Protecting Internet activities About Intrusion Prevention 279 When you exclude a Full Trust device from Intrusion Prevention scan, Norton Internet Security does not scan any information that is received from this device. The Full Trust devices that are excluded from Intrusion Prevention scan are added to Intrusion Prevention exclusion list. If you find that any of the devices that you excluded from Intrusion Prevention scan is infected, you can purge the saved exclusion list and remove all the devices.
Protecting Internet activities About Vulnerability Protection About Vulnerability Protection Vulnerability Protection is a component of Intrusion Prevention System. Vulnerability Protection provides information about the susceptibility of the programs that may be on your computer against malicious attacks. It also provides information about the known attacks that they are protected from.
Protecting Internet activities About Vulnerability Protection 281 Viewing the list of vulnerable programs The Vulnerability Protection window lets you view the extensive list of programs with the known vulnerabilities that Norton Internet Security protects you against. For each program, you can view details such as the name of the program, its vendor, and the number of vulnerabilities that the program contains. You can also view more details about the vulnerabilities by clicking on the program name.
Protecting Internet activities About the types of security risks The Program Vulnerability Details list does not include any signature that you disable in the Intrusion Signatures window. By default, all the signatures in the Intrusion Signatures window are turned on. Unless you have a good reason to disable a signature, you should leave the signatures turned on. If you disable a signature, your computer may be vulnerable to attack.
Protecting Internet activities About the types of security risks 283 card numbers. These programs can then send your compromised data to other people. Adware displays advertisements on your computer and collects information about your Web browsing habits. It then gives this data to companies that can send you advertisements based on these preferences. Tracking cookies are the small files that programs can place on your computer to track your computing activities.
Protecting Internet activities About Norton AntiSpam About Norton AntiSpam Norton AntiSpam lets you categorize the email messages that you receive in your email programs into spam email and legitimate email. It filters legitimate email into the Inbox folder and spam email into the Junk folder or the Norton AntiSpam folder. Norton AntiSpam uses Symantec enterprise-class, spam-filtering technology to classify the spam email messages from legitimate email messages.
Protecting Internet activities About Norton AntiSpam 285 Norton AntiSpam also automatically imports the lists of addresses from supported email programs during the initial integration. It helps you keep your list of allowed and blocked email senders in sync with your current address books. When Norton AntiSpam imports the addresses from your Outlook address book or Windows address book, it also imports the addresses that are available in the Safe Sender and the Blocked Sender lists.
Protecting Internet activities About Norton AntiSpam 1 The option to filter email messages through Web Query to maintain high spam detection efficiency Configuring Client Integration The Client Integration window lists the supported email programs, or clients, that are installed on your computer and their associated address books. When you select an email program, Norton Internet Security adds a Norton AntiSpam drop-down list or a few options to the toolbar of the supported email program.
Protecting Internet activities About Norton AntiSpam 287 you want to manually import addresses, use the Import option in the Allowed List window. When you open your email client, the welcome screen appears. If you do not want the welcome screen to appear in the future, check the Don't show this again option before you click Close. Norton Internet Security notifies the successful integration of Norton AntiSpam with your email client.
Protecting Internet activities About Norton AntiSpam 6 Select one or more address books to be imported automatically into your Allowed List. 7 Click OK to save the changes and close the Client Integration window. Setting Address Book Exclusions When you add an email address to the Address Book Exclusions list, Norton AntiSpam does not import the address into the Allowed List and Blocked List.
Protecting Internet activities About Norton AntiSpam 289 7 Click OK to close the Add Email Address dialog box. 8 Click OK to save and close the Address Book Exclusions window. To edit or delete entries in the Address Book Exclusions list 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the Network tab. 3 In the left pane, click Message Protection. 4 Under AntiSpam, in the Address Book Exclusions row, click Configure.
Protecting Internet activities About Norton AntiSpam To import an address book 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the Network tab. 3 In the left pane, click Message Protection. 4 Under AntiSpam, in the Allowed List row, click Configure. 5 In the Allowed List window, click Import. 6 In the Allowed List window, click Apply. 7 Click OK. To add entries to your Allowed List 1 In the Norton Internet Security main window, click Settings.
Protecting Internet activities About Norton AntiSpam 291 To edit or delete entries in the Allowed List 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the Network tab. 3 In the left pane, click Message Protection. 4 Under AntiSpam, in the Allowed List row, click Configure. 5 In the Allowed List window, select the item that you want to edit or delete.
Protecting Internet activities About Norton AntiSpam To import addresses to the Blocked List 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the Network tab. 3 In the left pane, click Message Protection. 4 Under AntiSpam, in the Allowed List row, click Configure. 5 In the Allowed List window, click Import. 6 In the Allowed List window, click Apply. 7 Click OK.
Protecting Internet activities About Norton AntiSpam 293 To edit or delete entries in the Blocked List 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the Network tab. 3 In the left pane, click Message Protection. 4 Under AntiSpam, in the Blocked List row, click Configure. 5 In the Blocked List window, select the item with which you want to work.
Protecting Internet activities About Norton AntiSpam You can use the following options: This is Spam Marks the selected email as spam and moves the email message into the Junk folder or the Norton AntiSpam folder. When you reclassify an email message as spam, Norton Internet Security provides you the option to send the misclassified email message as feedback to Symantec. This option appears only if the Feedback option in the Message Protection section of the Settings window is set as Ask Me.
Protecting Internet activities About Norton AntiSpam Empty Spam Folder 295 Removes all email that has been placed in the Junk folder or the Norton AntiSpam folder. Open Displays the Message Protection section of the Norton Settings window. AntiSpam The Message Protection section is available in the Network tab. Setting the Feedback option Email messages in the email client might sometimes get wrongly classified as spam or legitimate.
Protecting Internet activities About Norton AntiSpam 4 Under AntiSpam, in the Feedback row, select any one from the following three options: On Automatically sends the misclassified email message to Symantec when you classify an email message as spam or legitimate Ask Me Prompts you before Norton AntiSpam sends the misclassified email message to Symantec when you classify an email message as spam or legitimate Off Does not send the misclassified email message to Symantec 5 In the Settings window
Protecting Internet activities About Norton AntiSpam 297 approach to filter spam email messages from legitimate email messages. The email messages that you receive in your email program undergo scanning through different local filters of Norton AntiSpam. The local filters use Whitelist technique, Blacklist technique, and patented filtering technology to classify email messages as legitimate or spam.
Protecting Internet activities About configuring POP3 and SMTP ports Norton AntiSpam then sends the email message to your email program. Based on predefined email rules, the email program then moves the email message to the Junk folder or the Norton AntiSpam folder. w Symantec recommends you to keep the Web Query option turned on. Turning off the Web Query option increases your exposure to the spam email messages that contain phishing or spam URLs.
Protecting Internet activities About configuring POP3 and SMTP ports 299 Norton Internet Security lets you manually configure your POP3 and SMTP email ports for email protection. Typically, your Internet service provider (ISP) provides you the port numbers for your email program. If the SMTP and POP3 port numbers for your email program are different from the default port numbers, you must configure Norton Internet Security.
Protecting Internet activities About configuring POP3 and SMTP ports 3 In the left pane, click Message Protection. 4 In the Protected Ports Settings row, click Configure. 5 In the Protected Ports window, click Add. 6 In the Add Port to protect window, in the Port Type drop-down list, do one of the following: 1 To add the incoming email port, click POP3. 1 To add the outgoing email port, click SMTP. 7 In the Port box, type the port number. The port number must be between 1 and 65535. 8 Click OK.
Protecting Internet activities About the Network Security Map 301 About the Network Security Map A home network typically consists of the computers and other devices that share your Internet connection. The Network Security Map helps you view and manage your network. After you configure Network Security Map, Norton Internet Security automatically detects the devices that are connected to your network and lists them in the Network Security Map.
Protecting Internet activities About the Network Security Map 1 Wireless Security 1 Remote Monitoring 1 Network Map 1 Trust Controls You can click each of the features and read the summary to learn more about using Network Security Map to manage your home network. By default, the NetworkSecurityOverview window appears each time you open Network Security Map. If you do not want to view the Network Security Overview window, you can turn it off.
Protecting Internet activities About the Network Security Map 303 Viewing devices on the Network Security Map The NetworkSecurityMap window provides a pictorial representation of the devices on the network to which your computer is connected. You can view the details of each device, such as device name, security status, and IP address.
Protecting Internet activities About the Network Security Map 3 If the Product Configuration panel appears, click Continue. The Product Configuration panel appears when you click Network Security Map for the first time. The Product Configuration panel helps you install Symantec Security Driver that is required to view the Network Security Map window. The process of installation of the Symantec Security Driver disrupts your network connection temporarily.
Protecting Internet activities About the Network Security Map 305 To view the details of a device on the Network Security Map
Protecting Internet activities About the Network Security Map 4 In the Network Security Map window, click a device icon. You can use the scroll arrows to view the devices that are listed in the network map. The device details section that is located below the network map displays the following details: Device Name Shows the name of the device For a computer, the Network Security Map displays the NetBIOS name by default.
Protecting Internet activities About the Network Security Map Category Shows the category to which the device belongs The device category icon provides details on the connection status and security status. Norton Internet Security labels all unknown devices as NEW and sets the category as GENERIC DEVICE. This category may include computer-related devices, such as printers, media devices, and game consoles. You can change the device category in the Edit Device Details window.
Protecting Internet activities About the Network Security Map Trust Level Shows the access level that is granted to a remote device to connect to your computer The initial trust level is set based on the configuration of your computer. You can set trust level for all devices other than MY PC.
Protecting Internet activities About the Network Security Map Excluded from IPS scanning 309 Shows if the device is excluded from Intrusion Prevention scan. You can exclude a Full Trust device from Intrusion Prevention scan. When you exclude a trusted device from Intrusion Prevention scan, Norton Internet Security trusts this device and does not scan any information that is received from this device.
Protecting Internet activities About the Network Security Map 3 On the left side of the Network Security Map window, under Remote Monitoring, click Setup. 4 In the Remote Monitoring Setup window, type a Passkey. The Passkey should be between 6 and 20 characters in length. The Passkey is case sensitive.
Protecting Internet activities About the Network Security Map 311 2 Under Network Protection, click Network Security Map. 3 On the left side of the Network Security Map window, under Remote Monitoring, click Disable. 4 In the confirmation dialog box, click Yes. To turn off Remote Monitoring for an individual computer 1 In the Norton Internet Security main window, click Advanced. 2 Under Network Protection, click Network Security Map.
Protecting Internet activities About the Network Security Map The default trust level of the devices that you add to the Network Security Map is Protected. However, you can change the trust level of the devices. w If you trust a device that is not on your network, you can expose your computer to potential security risks. To add a device to the Network Security Map 1 In the Norton Internet Security main window, click Advanced. 2 Under Network Protection, click Network Security Map.
Protecting Internet activities About the Network Security Map 313 Finding a computer's IP address You can find a computer's IP address in various ways. On Windows 2000/XP, Windows Vista, Windows 7, and Windows 8 computers, you can use the ipconfig command to find the IP address of a computer. The ipconfig command reports the IP address of its local computer only. You must run this program on the computer that you want to identify.
Protecting Internet activities About the Network Security Map To find the IP address by using ipconfig on Windows 8 1 On the Apps screen, under Windows System, click Command Prompt. 2 At the command prompt, type ipconfig, and then press Enter. 3 Write down the IP address. Editing device details You can change the name and category of a device that is available on the Network Security Map. You can select the categories such as Generic Device, Laptop, Media Device, or Game Console.
Protecting Internet activities About the Network Security Map 315 6 In the Category drop-down list, click one of the following device categories: 1 GENERIC DEVICE 1 DESKTOP PC 1 LAPTOP 1 SERVER PC 1 NETWORK PRINTER 1 ROUTER/SWITCH 1 CABLE/DSL MODEM 1 MEDIA DEVICE 1 GAME CONSOLE 1 PDA/MOBILE PHONE 1 NETWORK STORAGE DEVICE 1 WEB CAMERA 1 TABLET 1 MUSIC PLAYER 1 TV 7 Click OK.
Protecting Internet activities About the Network Security Map Editing network details You can view the details and change the name of your network in the Edit Network Details window. w You cannot edit the Trust Control network details. To edit network details 1 In the Norton Internet Security main window, click Advanced. 2 Under Network Protection, click Network Security Map. 3 In the Network Security Map window, on the right side of Network Details, click Edit.
Protecting Internet activities About the Network Security Map 317 In addition, the trust level of a device is Shared in any of the following cases: 1 When the computer on the network has one or more folders or printers that are shared 1 When the computer is Media Center compatible (for example, if you have Windows XP Media Center Edition, Windows Vista Home Premium, Windows Vista Ultimate, Windows 7 Home Premium, Windows 7 Professional, or Windows 7 Ultimate) w If you use a wireless network that is not
Protecting Internet activities About the Network Security Map 5 To select a trust level for a network, in the Edit Network Trust Level window, click one of the following: FULL TRUST Adds the network to the Trusted list All the network traffic that your computer receives from a Trusted network is filtered and allowed through firewall. However, known attacks and infections are still monitored. You should select this setting only when you are sure that the network is completely safe.
Protecting Internet activities About the Network Security Map RESTRICTED 319 Adds the network to the Restricted list The devices that are on Restricted network cannot communicate with your computer. However, you can still use the network to browse Web sites, send email messages, or transmit other communications. 6 Click OK. To change the trust level of a device 1 In the Norton Internet Security main window, click Advanced. 2 Under Network Protection, click Network Security Map.
Protecting Internet activities About the Network Security Map 5 To select a trust level for a device, in the Edit Device Trust Level window, click one of the following: FULL TRUST Adds a device to the Full Trust list Full Trust devices are monitored only for known attacks and infections. You should select this setting only when you are sure that the device is completely safe. RESTRICTED Adds a device to the Restricted list Restricted devices do not have access to your computer.
Protecting Internet activities About the Network Security Map 321 Scanning every request from all the devices that access your computer increases the scan time which slows down the network speed of your computer. If you know that a specific device on your network is safe, you can apply Full Trust level to this device. In addition, you can exclude this specific device from Intrusion Prevention scan.
Protecting Internet activities About the Network Security Map 4 In the Network Security Map window, do one of the following: 1 To edit the trust level of a device that is on your network, in the network map, click the device. 1 To edit the trust level of a device that you manually added, in the Network Details drop-down list, click Trust Control, and then click the device. 5 In the device details section, in the Trust Level row, click Edit. 6 In the Edit Device Trust Level window, click FULL TRUST.
Protecting Internet activities About the Network Security Map 323 When you remove an individual device, the online devices appear again the next time you open the Network Security Map. However, Norton Internet Security permanently removes the offline devices. To remove an individual device 1 In the Norton Internet Security main window, click Advanced. 2 Under Network Protection, click Network Security Map.
Protecting Internet activities About the Network Security Map For more information on how to secure your wireless network, on the left side of the Network Security Map window, click the Why is it not secure link. Follow the instructions. w You should only trust a wireless connection that is secure. Trusting a wireless connection that is not secure puts all of the devices on your network at risk.
Protecting Internet activities About the Network Security Map 325 To view the device details 1 In the Norton Internet Security main window, click Advanced. 2 Under Network Protection, click Network Security Map. 3 In the Network Security Map window, in the network map, click the device for which you want to see the details. You can view the details of only the computers that you remotely monitor. 4 In the device details section, next to Category, click Details.
Protecting Internet activities About Network Cost Awareness To modify the communication port for Network Security Map 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the Network tab. 3 In the Communication Port box, type a new communication port number. You must use the same port number for each of the device that is connected to your Network Security Map. 4 Click Apply. 5 Click OK.
Protecting Internet activities About Network Cost Awareness 327 You can set up one of the following policies for each of the network connection that Norton Internet Security uses to connect to the Internet: 1 w Auto Allows Norton Internet Security to receive all product and virus definition updates based on the Windows 8 cost awareness policy. By default, the Auto policy has unlimited Internet connection on LAN and Wi-Fi. The Auto option is available only in Windows 8.
Protecting Internet activities About Network Cost Awareness the Internet usage of Norton Internet Security. Norton Internet Security connects to the Internet based on the policy that you set up in the Network Cost Awareness Settings window. By default, Network Cost Awareness is turned on. To turn off Network Cost Awareness 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the Network tab. 3 In the left pane, click Network Security Settings.
Protecting Internet activities About Network Cost Awareness 329 network bandwidth that Norton Internet Security can use. To define the Internet usage of Norton Internet Security 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the Network tab. 3 In the left pane, click Network Security Settings. 4 In the Network Cost Awareness row, move the On/Off switch to the left to the On position. 5 Click Configure.
Protecting Internet activities About Network Cost Awareness 7 Select one of the following: 1 Auto Allows Norton Internet Security to receive all product and virus definition updates based on the Windows 8 cost awareness policy. By default, the Auto policy has unlimited Internet connection on LAN and Wi-Fi. w The Auto option is available only in Windows 8. 1 1 1 No Limit Allows Norton Internet Security use the network bandwidth that is required to receive all product and virus definition updates.
Securing your sensitive data 6 This chapter includes the following topics: 1 About securing your sensitive data About securing your sensitive data The Internet provides the fastest and the easiest way to exchange information. In spite of the many advantages that the Internet provides, you are vulnerable to information theft and identity theft. Information can be stolen and misused in several ways.
Securing your sensitive data About securing your sensitive data window. The Norton Safe Web feature provides you a safe search environment in the Web by displaying the site rating icons next to every search result. When you install Norton Internet Security, it adds the Norton Toolbar to the Internet Explorer, Firefox, or Chrome browsers.
Securing your sensitive data About securing your sensitive data 333 view more details about the safety status of the Web sites you visit. In addition, the Norton Site Safety pop-up window includes information about Symantec Authenticated Web sites. Web site hackers often mimic company Web sites to create fraudulent Web sites. Norton Internet Security identifies the fraudulent Web sites. Symantec analyzes the pages of these sites and verifies if they belong to the company that it represents.
Securing your sensitive data About securing your sensitive data Reporting an incorrect evaluation of a Web site On rare occasions, Antiphishing may report incorrect evaluation of a Web site. For example, you might visit a site that you shop with regularly and Antiphishing reports that the site is fraudulent. On the contrary, you might visit a Web site that you suspect is a phishing site, but Antiphishing reports that no fraud was detected.
Securing your sensitive data About securing your sensitive data 335 navigation to the Web sites that are confirmed to be fraudulent. The Norton Site Safety pop-up window helps you understand if the Web site that you visit is safe or unsafe. You can turn off or turn on Antiphishing in the Safe Surfing section of the Settings window. The Safe Surfing section is available in the Web tab. To turn off or turn on Antiphishing 1 In the Norton Internet Security main window, click Settings.
Securing your sensitive data About securing your sensitive data w Norton Safe Web supports Internet Explorer, Firefox, or Chrome Web browsers. You can view the site safety status of any Web site using the Full Report option on the Norton Site Safety pop-up window. You can also use the Community Buzz option on the Norton menu to view the safety status of the Web sites. w The Community Buzz option is available only in English-language versions of Windows.
Securing your sensitive data About securing your sensitive data 337 Norton Safe Web provides the following Web site safety states when you browse through the Internet: Norton Secured You can see Norton Secured icon next to the search results. Symantec has analyzed this page and determined that the Web site is VeriSign trusted and is safe to visit. Site is Safe You can see a green OK icon next to the search results.
Securing your sensitive data About securing your sensitive data Site is Unsafe You can see a red cross (x) icon next to the search results. When you visit a Web site with this status, you can see a similar status icon on the Norton Toolbar. Norton Safe Web has analyzed this Web site and determined that the Web site is unsafe to visit. This Web site may attempt to install malicious software on your computer. Caution You can see a yellow exclamation mark icon next to the search results.
Securing your sensitive data About securing your sensitive data Untested Norton Safe Web does not have sufficient information about this Web site to provide a shopping safety rating. Risky Norton Safe Web has analyzed this Web site and determined that the site has shopping risks. 339 Symantec recommends that you do not visit this page. The Web site may sell counterfeit items without proper indication.
Securing your sensitive data About securing your sensitive data In addition, Norton Safe Web protects your computer while you use Facebook. It scans each URL that is available on your Facebook Wall and displays the Norton rating icons for the scanned URLs. You can also let other Facebook users know about the security status of any Web site. To scan your Facebook Wall using Norton Safe Web, use the Scan Facebook Wall option.
Securing your sensitive data About securing your sensitive data 341 In addition, Norton Safe Search provides the following features: Unsafe Site Filter When you search the Internet using Norton Safe Search, it analyzes the security levels of the Web sites and displays the search results. You can use the Filter Out Unsafe Sites option in the Norton Safe Search Web site to filter the unsafe Web sites from the search results.
Securing your sensitive data About securing your sensitive data You can use Norton Safe Search even when you turn off the Identity Safe features. w Norton Safe Search is supported only in the Internet Explorer, Firefox, or Chrome Web browsers. To search the Web using Norton Safe Search 1 Start your Web browser. 2 On the Norton Toolbar, in the Norton Safe Search box, type the search string that you want to search. 3 Do one of the following: 1 Click Search.
Securing your sensitive data About securing your sensitive data 343 4 In the Norton Safe Web row, do one of the following: 1 To turn off Norton Safe Web, in the Norton Safe Web row, move the On/Off switch to the right to the Off position. 1 To turn on Norton Safe Web, in the Norton Safe Web row, move the On/Off switch to the left to the On position. 5 In the Settings window, click Apply. 6 Click OK.
Securing your sensitive data About securing your sensitive data 5 In the Scam Insight row, do one of the following: 1 To turn off Scam Insight, in the Scam Insight row, move the On/Off switch to the right to the Off position. 1 To turn on Scam Insight, in the Scam Insight row, move the On/Off switch to the left to the On position. 6 In the Settings window, click Apply. 7 Click OK. 8 Click Close.
Securing your sensitive data About securing your sensitive data 1 1 1 345 Antiphishing also helps to protect you from malicious Web sites when you perform online transactions. Manages your card information when you have multiple credit cards to maintain Safeguards the data that you save on your computer By saving your data with a local vault, you can prevent your sensitive Identity Safe data on your computer from being misused.
Securing your sensitive data About securing your sensitive data the product expires. This way, you can still view or manage your login details even after Norton Internet Security expires. However, it is not safe to browse the Internet after Norton Internet Security expires as you are vulnerable to online thefts and phishing attacks.
Securing your sensitive data About securing your sensitive data 1 347 The computer must be connected to the Internet. The Identity Safe data is stored online using your Norton Account. You can create only one online vault for a Norton Account. w If you have Identity Safe data that is stored on any external drives from the older versions of Norton Internet Security, you can convert that portable profile to local vault or online vault.
Securing your sensitive data About securing your sensitive data 6 Click OK. About Identity Safe vaults You can create one local vault for each Windows user account on your computer. The data that you save and the Identity Safe settings that you make are specific to that local vault. You cannot access the data that you save in one Windows user account from another Windows user account. This way Identity Safe protects your sensitive data from misuse by multiple users of your computer.
Securing your sensitive data About securing your sensitive data 349 In addition to the features such as saving logins, cards, and notes, you can do the following using your Identity Safe vault: 1 Import your Identity Safe data from the file you already backed up. You can also import the data that you stored in portable profile from an older version of the product to the current version. Export your Identity Safe data to .DAT file. 1 Reset your Identity Safe.
Securing your sensitive data About securing your sensitive data You can create Identity Safe vaults from the Identity Safe section of the Settings window. The Identity Safe section is available in the Web tab. Creating online vault Identity Safe lets you create an online vault and save your Identity Safe data. You can create one online vault for each Norton Account. You cannot create a new local vault but use your existing local vault when you upgrade to new version of the Norton Internet Security.
Securing your sensitive data About securing your sensitive data 351 7 In the Re-type Vault Password box, type the password again to confirm. 8 In the Password Hint box, type a hint for the password. 9 Check Store information online through your Norton Account. This option appears only if you log in to your Norton Account. 10 Click Create. 11 In the Identity Safe Setup Successful window, click Get Started.
Securing your sensitive data About securing your sensitive data 5 At the bottom of the Set Up Identity Safe window, click Log In to Norton Account. 6 In the Sign In to Norton Account window, type your E-mail Address and Password. 7 Click Sign In. Syncing local vault to online vault You can sync the Identity Safe data from your local vault to the online vault. When you move the data from your local vault to online vault, all the data in your local vault is removed permanently.
Securing your sensitive data About securing your sensitive data 353 5 In the Sync Identity Safe Data Online window, in the Enter the Password box, type the password for your local vault. 6 Click Log In to Norton Account. 7 In the Sign In to Norton Account window, type your Norton Account user name and password, and click Log In. 8 Click Validate. 9 In the Sync Identity Safe Data Online window, create a password for your online vault. 10 Click Sync Data.
Securing your sensitive data About securing your sensitive data 5 In the Sync Identity Safe Data Online window, in the Enter the Password box, type the password for your local vault. 6 Click Log In to Norton Account option at the bottom of the Sync Identity Safe Data Online window. 7 In the Sign In to Norton Account window, type your Norton Account user name and password, and click Sign In. 8 Click Validate.
Securing your sensitive data About securing your sensitive data 355 5 In the Warning window, click Yes. 6 In the Settings window, click Apply. 7 Click OK. Merging portable profile to local vault or online vault If you have Identity Safe data that is stored on any external drives from the older versions of Norton Internet Security, you can merge that portable profile to local vault or online vault.
Securing your sensitive data About securing your sensitive data Importing logins Identity Safe lets you import the logins that you have saved in Internet Explorer. After you set up Identity Safe vaults, the Identity Safe Setup Successful window appears. You can use this window to import your logins. The imported logins appear in the Vault Open menu on the Norton Toolbar and in the Edit Logins window. You can use the imported logins the same way that you use the logins that you create.
Securing your sensitive data About securing your sensitive data w 1 You experience a computer failure. 1 You forget your Identity Safe password. 357 If you forget your Identity Safe password, you cannot restore it. You can only reset your Identity Safe and store all your data again. Norton Internet Security lets you enter an incorrect password three times. If your attempts are unsuccessful, Norton Internet Security provides you an option to reset your Identity Safe.
Securing your sensitive data About securing your sensitive data 1 From the Norton Toolbar With Norton Internet Security, you can access and configure all the Identity Safe features even after the product expires. The following are the features that you can view or access after the product expires: Edit Logins You can view the Edit Logins window using the Identity Safe menu on the Norton Toolbar. Export Data You can use this feature to take a backup of your Identity Safe data.
Securing your sensitive data About securing your sensitive data 359 Logging in to and logging out of Identity Safe You can log in to or log out of Identity Safe from the following areas of Norton Internet Security: 1 The Web tab in the Norton Internet Security Settings window 1 The Norton Toolbar To secure your Identity Safe data from others, log out of Identity Safe whenever you are away from your computer.
Securing your sensitive data About securing your sensitive data 4 Click Open Vault. To log out of Identity Safe from the Norton Toolbar 1 Start your Web browser. 2 On the Norton Toolbar, click Vault Open, and then click Close Vault. Configuring Identity Safe settings You can use the various features in Identity Safe to manage your personal sensitive information. The logins, cards, and notes help you store and use your information in a secure way.
Securing your sensitive data About securing your sensitive data 361 4 Under Identity Safe, identify the feature that you want to use, and click Configure. Your options are: Identity Safe Setup Lets you set up Identity Safe vault. You can create a local vault or an online vault and store your Identity Safe data. You must log in to your w Norton Account to create an online vault.
Securing your sensitive data About securing your sensitive data Browsing Options Lets you configure the way you want Identity Safe to collect, store, and display the login information for the Web pages you visit. You can configure Identity Safe to display your cards that you created for the Web sites that have forms. You can also configure the autofill settings for the Web sites that contain security threats.
Securing your sensitive data About securing your sensitive data Edit Cards Lets you manage your personal information such as name, date of birth, email address, and credit card information in one place. You can use the information that you store to automatically fill forms. This feature lets you provide sensitive information without typing it when you are online. In this way, Identity Safe protects you from keyloggers that steal and misuse your identity.
Securing your sensitive data About securing your sensitive data Edit Notes Lets you store and manage sensitive information. You can save social security number, driver's license number, insurance policy number, and passport number. You can also save private accounts, lock combinations, documents, notes, frequent flier numbers, bank account number, security challenge questions, and legal and financial information. Export Data Lets you back up the Identity Safe data in .DAT or .CSV file formats.
Securing your sensitive data About securing your sensitive data Sync Data Online 365 Lets you move your Identity Safe data that you stored in your local vault to online vault. When you sync your w Identity Safe data from local vault to online vault, the data in the local vault is permanently removed. Delete Data Lets you permanently remove the Identity Safe vault. About Edit logins The Edit Logins feature in Identity Safe lets you view all the logins that you want Identity Safe to manage.
Securing your sensitive data About securing your sensitive data 1 Lets you quickly launch the Web site login page 1 Fills in your login automatically when you revisit Web pages Lets you manually add logins 1 Lets you change the URL of your saved logins 1 1 1 Lets you view the last time you made changes to the settings of your saved logins Lets you access the login features that you saved for a Web site even after Norton Internet Security expires.
Securing your sensitive data About securing your sensitive data 367 appears on the top left corner of the Login Assistant window. Identity Safe automatically detects login fields which are not auto filled or filled incorrect by Identity safe in the Web pages and displays the Need Assistance menu bar in your browser. The Need Assistance menu bar will let you use the saved login credentials.
Securing your sensitive data About securing your sensitive data 2 Type your login details, and then click the option or link that logs you in. Norton Internet Security automatically saves your login details when you enter them for the first time. To save additional logins for a Web site 1 Go to the Web page for which you want to save another login. Your login credentials automatically appear on the Web page. 2 Clear the login credentials that appear on the Web page.
Securing your sensitive data About securing your sensitive data 1 1 1 Lets you change the URL of your saved logins. 1 w Lets you quickly launch the Web site login page. Fills in your login automatically when you revisit Web pages. Lets you manually add logins. 1 369 Lets you view the last time you made changes to the settings of your saved logins. Edit Logins also lets you access all the login features that you saved for a Web site even after Norton Internet Security expires.
Securing your sensitive data About securing your sensitive data 7 Click OK. 8 In the Username dialog box, in the Enter new username box, type the user name of the login, and then, click OK. 9 In the Information dialog box, click OK. The Information dialog box prompts you to set a password for the login that you created. 10 In the Edit logins window, in the Password box, type the password of your login. 11 Click Close. 12 In the Save dialog box, click Yes to save the changes.
Securing your sensitive data About securing your sensitive data 371 10 In the confirmation dialog box, click Yes to save the changes. To delete a login or a folder 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the Web tab. 3 In the left pane, click Identity Safe. 4 Under Identity Safe, in the Edit Logins row, click Configure. 5 In the Edit Logins window, under Logins, select the Web site name or the folder that you want to delete.
Securing your sensitive data About securing your sensitive data When you save a login, you can do the following: 1 Quickly launch the Web site login page using the URL 1 Change the URL of the login manually Ensure that the URL you change belongs to the same domain as the current URL. 1 View the details of the date and time when you last made to the Edit Logins settings To quick-launch a login Web page 1 In the Norton Internet Security main window, click Settings.
Securing your sensitive data About securing your sensitive data 373 7 In the Update URL window, in the Enter the new URL here box, type the new URL. Ensure that the URL you modify is valid and is prefixed with HTTP or HTTPS. 8 Click OK. 9 In the Edit Logins window, click Close. Changing the user name and password Identity Safe lets you change the user name and password for the logins that you have saved in the Edit Logins window.
Securing your sensitive data About securing your sensitive data 5 In the Edit Logins window, under Logins, select the Web site name for which you want to change the password. 6 Under Details, next to the Password box, click Show. The Validate Password for Identity Safe window appears. This window appears only if you have changed the security level of the Identity Safe password to Ask for my password before filling out a login or form in the Password & Security window.
Securing your sensitive data About securing your sensitive data 375 3 Type the new password, and then click the button or link that logs you in. 4 In the Save new password for login? menu bar, click Save. About Edit Cards The Edit Cards option in Identity Safe lets you manage your personal information such as name, date of birth, email address, and credit card information in one place.
Securing your sensitive data About securing your sensitive data Identity Safe automatically detects login fields which are not auto filled or filled incorrect by Identity safe in the Web pages and displays the Need Assistance menu bar below the Norton Toolbar in your browser. The Need Assistance menu bar lets you choose the required card from the list of cards that you have saved.
Securing your sensitive data About securing your sensitive data 377 3 In the left pane, click Identity Safe. 4 Under Identity Safe, in the Edit Cards row, click Configure. 5 In the Edit Identity Cards window, click Add Card. 6 Use the following tabs to type your card details: General Provide details such as card name, name, gender, and date of birth. You can set a password and provide additional security for your card. Online form filling is language-specific.
Securing your sensitive data About securing your sensitive data Editing, deleting, or duplicating cards All the cards that you have saved in Identity Safe are listed in the Edit Identity Cards window. You can select, view, duplicate, and edit the details of any card that you created. You can delete a card if it is no longer needed. You can also duplicate a saved card and change only the fields that you want to change. You can view a summary of the card that you created.
Securing your sensitive data About securing your sensitive data 379 7 Modify the required details that you want to change. 8 Click Save. 9 Click Close. To delete a card 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the Web tab. 3 In the left pane, click Identity Safe. 4 Under Identity Safe, in the Edit Cards row, click Configure. 5 In the Edit Identity Cards window, select the card that you want to delete. 6 Click Delete Card.
Securing your sensitive data About securing your sensitive data card to fill the Web site with the details that are saved in the card. You can also copy and edit the required fields from the selected card in the Login Assistant window. By default, the important data such as Passwords, Credit Card number, and birth date are hidden; you need to select Show option to view and copy the data. w Symantec recommends you to clear your data copied from the cards by selecting Clear Clipboard option.
Securing your sensitive data About securing your sensitive data 381 5 In the Edit Notes window, under Details, in the Title box, type a title for the note you want to save. If a note already exists, click Create New Notes, and then under Details, in the Title box, type a title for the note you want to save. 6 Type any additional information in the Information box. 7 Click Save. 8 In the Edit Notes window, click OK. To edit Notes 1 In the Norton Internet Security main window, click Settings.
Securing your sensitive data About securing your sensitive data 8 In the Edit Notes window, click OK. About exporting and importing Identity Safe data You can export your Identity Safe data for security purposes, data recovery, or when you transfer your Identity Safe data to a new computer. The backup files are saved as .DAT files. You can protect the files that you backed up with a password. Symantec recommends that you use a password to keep your Identity Safe data more secure.
Securing your sensitive data About securing your sensitive data 383 2 In the Settings window, click the Web tab. 3 In the left pane, click Identity Safe. 4 Under Identity Safe, in the Export Data row, click Configure. 5 In the Export Identity Safe Data window, select the File Format. You can select one of the following: 1 Identity Safe Backup Format 1 Plain text 6 In the Export my data to box, type or browse to the location to which you want your data saved.
Securing your sensitive data About securing your sensitive data w When importing, the file size must not be more than 15 MB for .CSV files and 35 MB for .NPM files. To import your data 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the Web tab. 3 In the left pane, click Identity Safe. 4 Under Identity Safe, in the Import Data row, click Configure.
Securing your sensitive data About securing your sensitive data 385 About Browsing Options Browsing Options lets you configure the way you want Identity Safe to collect, store, and display the login information for the Web pages you visit. You can configure Identity Safe to display your cards that you created for the Web sites that have forms. You can also configure the autofill settings for the Web sites that contain security threats. w Symantec recommends you to keep the default settings for logins.
Securing your sensitive data About securing your sensitive data Save my credentials when I Lets you save the login log in to Web sites credentials for the Web sites that you visit. You can use the following options: 1 1 1 Yes, Save Automatically No, Never Save any logins Ask before saving In addition, you can use the Autofill sites containing security threats option to specify how you want Identity Safe to respond to the Web sites that have security threats.
Securing your sensitive data About securing your sensitive data Password Security 387
Securing your sensitive data About securing your sensitive data Specify the Identity Safe password security level. Identity Safe provides four levels of security to protect your Identity Safe password. Choose one of the following options: 1 Ask for my password at the beginning of each login session Prompts for your Identity Safe password the first time you access Identity Safe. If you are logged in to Windows, you do not need to provide the password again.
Securing your sensitive data About securing your sensitive data period. You can specify the idle time-out period as 15, 30, or 45 minutes. 1 Use this option if other people have access to your computer. Ask for my password after sleep or hibernation Prompts you for your Identity Safe password when your system restores from suspended state. This option prevents misuse of your Identity Safe data by validating your Identity Safe password each time your system restores from suspended state.
Securing your sensitive data About securing your sensitive data Changing the Identity Safe password You should change your Identity Safe Password regularly to prevent unauthorized access to your personal information in Identity Safe.
Securing your sensitive data About securing your sensitive data 391 You have the following options in the Norton Toolbar: Norton menu Lets you access the Web Settings and other settings. The following options are available in the Norton menu: 1 Report Site 1 Settings 1 Go to Norton Safe Web website 1 Enable Norton Safe Web 1 Enable Norton Safe Search/Disable Norton Safe Search 1 My Norton Account 1 Help The Minimize Toolbar w option appears only in the Internet Explorer browser.
Securing your sensitive data About securing your sensitive data Navigate to the Identity Safe Home Page icon Lets you access the Identity Safe data stored in your online vault. You can add, edit or delete your Logins, Cards, and Notes under this section. You can use the Norton Safe Search option to enhance your Web search experience. The Norton Safe Search uses Ask.com to generate the search results.
Securing your sensitive data About securing your sensitive data 393 Vault Open/Vault Closed Lets you view the logins and menu cards that you have saved in Identity Safe. Some Web sites have forms to fill or require login information. You can use the Vault Open/Vault Closed menu to fill the details in those Web sites. The Vault Open/Vault Closed menu displays the list of all logins and cards that you saved. You can select a login from the list and a use it to log in to the Web site.
Securing your sensitive data About securing your sensitive data or disable the Norton Toolbar, and uninstall the Norton Toolbar from your Chrome browser. If the Norton Toolbar is enabled, you can access the following options: w Allow in incognito Lets you browse internet in stealth mode without storing data of your browsing session in browsing or download histories. Allow access to file URLs Lets you view the URL location of the downloaded file.
Securing your sensitive data About securing your sensitive data 395 However, Norton Internet Security notifies you about suspicious and fraudulent Web sites or if an error needs your attention. To hide or show the Norton Toolbar in the Internet Explorer and Firefox Web browsers 1 At the top of your browser window, click View. 2 On the Toolbars submenu, do one of the following: 1 Uncheck Norton Toolbar to hide the toolbar. 1 Check Norton Toolbar to show the toolbar.
Securing your sensitive data About securing your sensitive data Accessing Identity Safe settings from the Norton Toolbar When you install Norton Internet Security, it adds the Norton Toolbar to the Internet Explorer, Firefox, and Chrome Web browsers. The Vault Open menu on the Norton Toolbar provides quick links to access the options under Identity Safe. To access the Identity Safe settings from the Norton menu 1 Start your Web browser.
Securing your sensitive data About securing your sensitive data 397 2 On the Norton Toolbar, in the Norton menu, select one of the following: Report Site Lets you report to Symantec about the current Antiphishing evaluation. Minimize Toolbar Lets you minimize the Norton Toolbar. When you check this option, the Identity Safe phrase and the Safe Web phrase disappear and only the Identity Safe and Safe Web indicators remain. In addition, the size of the Norton Safe Search box is reduced.
Securing your sensitive data About securing your sensitive data Enable Norton Safe Web Lets you turn on the Norton Safe Web feature which provides a safe online browsing experience. The following are the unique features of Norton Safe Web: 1 1 Enable Norton Safe Search/ Disable Norton Safe Search Displays the site safety rating icons next to the search results Displays the site safety rating icons when you are on a Web site Lets you view the Norton Safe Search box.
Securing your sensitive data About securing your sensitive data 399 Accessing the Vault Open/Vault Closed menu The Vault Open/Vault Closed menu on the Norton Toolbar lets you view and manage the logins, Identity cards, and notes that you saved. You can also access the Web tab of the Settings window using the Vault Open/Vault Closed menu. In addition, you can do the following: 1 1 1 1 1 Navigate to any Web site for which you have saved the login credentials.
Securing your sensitive data About securing your sensitive data 2 On the Norton Toolbar, in the Vault Open/Vault Closed menu, select one of the following: Merge Portable Data (Drive:\) Lets you merge the Identity Safe data from your portable profile that you have created from the previous versions of Norton Internet Security. This option appears in w the Vault Open/Vault Closed menu only if you have connected an external drive with portable profile.
Securing your sensitive data About securing your sensitive data Settings 401
Securing your sensitive data About securing your sensitive data Lets you view the various options that are available in Identity Safe. The options are: 1 Edit Logins 1 Lets you open the Edit Logins window. Edit Identity Cards 1 Lets you open the Edit Identity Cards window. Edit Notes 1 Lets you open the Edit Notes window. Export 1 Lets you open the Export Identity Safe Data window. Import 1 Lets you open the Import Identity Safe Data window.
Securing your sensitive data About securing your sensitive data autofill the login information in the current Web page. Report Issue Lets you open the Norton Feedback Web site. You can submit feedback on your experience with Identity Safe. You can also submit the problems that you encountered with Identity Safe. You can select from the list of problems or you can describe your problem. Close Vault Lets you log out of or log in to Identity Safe.
Securing your sensitive data About securing your sensitive data
Monitoring protection features 7 This chapter includes the following topics: 1 About Security History About Security History Security History window lets you do the following: 1 View the summary of alerts and event messages. 1 1 1 1 View the results of scans that are run on your computer. View the items that you submitted to Symantec Security Response Web site. Manage Quarantine items. Monitor the security tasks that your products perform in the background.
Monitoring protection features About Security History window displays details of each item in the Details pane.
Monitoring protection features About Security History 407 You can view the security items based on the category of events that you select and the search string that you provide. Norton Internet Security restricts the number of search results that appear on each page in the Security History window. Therefore, Security History divides the items that are returned for any search criteria and displays them on separate pages.
Monitoring protection features About Security History You can access Security History from the following areas: 1 Norton Internet Security advanced window 1 Various alert windows and notifications 1 Notification area of the Windows taskbar 1 Threats Detected section in different Scan windows To open Security History 1 In the Norton Internet Security main window, click Advanced. 2 In the Computer Protection pane, click History.
Monitoring protection features About Security History 409 items that are related to the Quarantine feature appear under Quarantine category in the Security History window. In addition, the Security History window displays details of each item in the Details pane. To view items in Security History 1 In the Norton Internet Security main window, click Advanced. 2 In the Computer Protection pane, click History.
Monitoring protection features About Security History 3 In Security History window, in the Show drop-down list, select the category of items that you want to view. Your options are: Recent History The Recent History view in the Security History window displays the alerts that you received during the last seven days. It lists the history of certain recent security events. Full History The Full History view in the Security History window displays the complete Security History.
Monitoring protection features About Security History Resolved Security Risks The security risks include the suspicious programs that can compromise the security of your computer. The Resolved Security Risks view in the Security History window displays a list of security risks that Norton Internet Security has detected and then repaired, quarantined, or removed. The quarantined items are listed in the Quarantine view. You can also view the quarantined items in the Quarantine view.
Monitoring protection features About Security History Quarantine The Security History Quarantine provides a safe location on your computer where you can isolate items while you decide an action to take on them. The Quarantine view in the Security History window displays all of the security risks that are isolated in the Security History Quarantine. SONAR Activity Symantec Online Network for Advanced Response (SONAR) identifies new threats based on the suspicious behavior of applications.
Monitoring protection features About Security History Firewall - Network and Connections The firewall monitors the communications between your computer and other computers on the Internet. The Firewall - Network and Connections category in the Security History window displays information about the networks that your computer connects to. It also displays the actions that you have taken to trust or to restrict networks and computers.
Monitoring protection features About Security History Firewall - Activities The firewall monitors the communications between your computer and other computers on the Internet. The firewall maintains rules to control Internet access to and from your computer. The Firewall - Activities view in the Security History window displays the rules that firewall creates. The rules that you create also appear in this view.
Monitoring protection features About Security History Download Insight Download Insight processes any executable file that you download for analysis of its reputation level. It then informs you about the processing results based on the Download Insight settings. The Download Insight view in the Security History window displays details of all events that Download Insight processes and notifies. This view also contains information about the actions that you take based on the reputation data of the events.
Monitoring protection features About Security History Identity The various features of Identity Safe help you manage your identities and provide additional security while you perform online transactions. The Identity view in the Security History window displays the Antiphishing definitions that Norton Internet Security downloads when you run LiveUpdate to obtain the latest virus definitions.
Monitoring protection features About Security History Performance Alert The performance alert feature lets you view, monitor, and analyze the impact of the system activities on your computer. The Performance Alert view in the Security History window provides details about the impact of the processes that run on your computer. The details include the process name, the resources used, the extent of resource utilization, and the overall impact of the process on your computer.
Monitoring protection features About Security History Sites reported to Symantec In some cases, you might have submitted evaluation of certain Web pages to Symantec. The Sites Reported to Symantec view in the Security History window displays all the Web sites that you reported to Symantec to verify authenticity. Norton Error Reporting Norton Internet Security may generate errors in some cases. For example, an error can occur when you run LiveUpdate or scan a folder.
Monitoring protection features About Security History Email Errors Email errors include any failure that occurs when Norton Internet Security tries to send, download, or scan an email message that you send or receive. The Email Errors view in the Security History displays details about any Email Error alerts that you receive when an Email error occurs. Details include the Error ID and the Error message.
Monitoring protection features About Security History Silent Mode Silent Mode suppresses alerts and notifications and temporarily suspends most of the background activities. The Silent Mode view in the Security History window displays the summary of the Silent Mode sessions.
Monitoring protection features About Security History 421 4 Click a row to view details for that item. If you want to view additional information about an item, click the More Details option in the Details pane or double-click the particular row. You can view the advanced details about the item in the Security History-Advanced Details window and take actions as needed.
Monitoring protection features About Security History The following table lists the categories that provide the advanced details about the Security History items: Alert Summary Displays the following information about the item: 1 Severity 1 This category displays the risk level of the selected item. The various levels of security risks are High, Medium, Low, and Info. Activity 1 This category displays the activity that was performed by Norton Internet Security.
Monitoring protection features About Security History Actions 423
Monitoring protection features About Security History Displays the actions that are available for the selected item The options in the Actions view vary depending on the options that are available in the Show drop-down list in the Security History window. The following are some of the Actions options: 1 Trust This action allows access to or from the selected computer or all of the unclassified computers on the selected network.
Monitoring protection features About Security History This action removes the restricted status from the selected computer or from all of the unclassified computers on the selected network. 1 This option is available in the Security History - Firewall Network and Connections view. View Rule This action shows the firewall rule that is used to control the Internet access attempts by the selected program in the Program Control window of Norton Internet Security.
Monitoring protection features About Security History 1 Stop Notifying Me This action prevents Norton Internet Security from notifying you when it blocks the selected attack signature in the future. 1 This option is available in the Security History - Intrusion Prevention view. Notify Me This action allows Norton Internet Security to notify you when it blocks the selected attack signature in the future. This option is available in the Security History - Intrusion Prevention view.
Monitoring protection features About Security History 427 Security History provides a centralized location where you can access the File Insight windows of the various events that are related to Security Risks, Download Insight, and Performance. The File Insight window lets you view more details of events that belong to some of the following categories in the Security History window: Resolved Security Risks Lets you view the detailed information about the resolved security risks in an organized way.
Monitoring protection features About Security History Unresolved Security Risks Lets you view the detailed information about the unresolved security risks in an organized way. The Unresolved Security Risks category includes the infected files for which Norton Internet Security was not able to take any action. This category mostly includes the low-level risks that require your attention for a suitable action.
Monitoring protection features About Security History Download Insight 429 Lets you view the reputation details of a file that you download. You can use these details to determine the safety level of the file and then decide the action that you want to perform. Performance Alert Lets you view the performance details of any File of Interest that is available on your computer.
Monitoring protection features About Security History You can select a tab to view more details about it. The File Insight window provides details about a file in the following tabs: Details Displays the information such as the confidence level, community usage of a file, how long ago the file was released and how stable the file is. Stability ratings of a file w may vary depending upon your operating system. You can view details such as the signature and the date on which the file was created.
Monitoring protection features About Security History Activity 431 Provides the details about the suspicious actions performed by the file on your computer. It also provides information about the resource usage of a process and the effect of the process on the overall CPU utilization of your computer.
Monitoring protection features About Security History Restore Let you return the security risk that is quarantined to the original location on your computer. Returns the selected Quarantine item to its original location without repairing it and excludes the item from being detected in the future scans. If you do not want to exclude the item from future scans uncheck the check box available in the Quarantine Restore window.
Monitoring protection features About Security History Unresolved Security Risks This category includes the security risks or the infected files that Norton Internet Security was not able to repair, remove, or quarantine. Quarantine This category includes the security risk items that are isolated from the rest of your computer while they await your attention for a suitable action. 433 The action options in the Threat Detected window for a risk vary depending on the risk type and its severity level.
Monitoring protection features About Security History Get help Takes you to the Symantec Security Response Web site Submit to Symantec Sends the security risk to Symantec Searching in Security History You can search the items that are listed in Security History. You can use the Quick Search option to find items using a keyword or the name of a security risk.
Monitoring protection features About Security History 435 particular security risk. You can then use the Export option to save the list in the Security History log. You can later import the log file and analyze the data. Security History stores the information in a separate file. When the file size reaches its maximum size limit, information that is related to new events overwrites the information that is related to older events.
Monitoring protection features About Security History 5 In the Save As dialog box that appears, navigate to a location and specify the name for the file. The category name in the Show drop-down list appears as the default file name. You can provide a file name of your choice. 6 In the Save as type box, select the format in which you want to save your log file. 7 Click Save. To import Security History information 1 In the Norton Internet Security main window, click Advanced.
Monitoring protection features About Security History 437 The Security History Quarantine includes the following groups of items: Security risks Includes the items such as spyware and adware that are generally low risk and that another program requires to function properly. You can restore these items if necessary. Security threats Includes viruses and other high-risk items. Once an item has been quarantined, you have several options.
Monitoring protection features About Security History 3 In the Threat Detected window, select the action that you want to perform. Some of the options are: Restore Returns the security risk that is quarantined to the original location on your computer This option is available only for the detected viral threats.
Monitoring protection features About Security History 439 Adding an item to the Quarantine Security History Quarantine provides a safe location on your computer in which you can isolate items while you decide on an action to take on each item. The Quarantine view in the Security History window displays a list of quarantined items. You can view the name and the risk status of each quarantined item. You can manually add an item to the Security History Quarantine.
Monitoring protection features About Security History to regain the functionality of a program that requires the risk program to run. For example, a shareware or freeware program that you download may use adware to keep its price low. In this case, you can allow the security risk program to remain on your computer or restore it if Spyware Protection has removed it. Some quarantined items are successfully disinfected after Norton Internet Security rescans them. You can also restore such items.
Monitoring protection features About Security History 441 Manually submitting an item to Symantec When a virus or other risk is detected, it is automatically submitted to Symantec Security Response Web site for analysis. If you have turned off the option to submit risks automatically, you can manually submit them from the Security History Quarantine. You must have an Internet connection to submit an item.
Monitoring protection features About Security History
Customizing protection features 8 This chapter includes the following topics: 1 Feature summary 1 About turning off automatic features 1 About customizing settings and options Feature summary Use the information in this section to familiarize yourself with the product. This section includes the following information: 1 A list of all of the features in the product 1 A brief description of each feature The feature summary can help you determine which feature to use to solve a problem.
Customizing protection features Feature summary downloads, and other files are scanned for viruses and other potential risks. In addition, the definition updates that Automatic LiveUpdate downloads when your computer is connected to the Internet keeps you prepared for the latest security risks.
Customizing protection features Feature summary Compressed File Scan Detects viruses, spyware, and other security risks in compressed files during manual scans. See “What to do if a security risk is found” on page 199. Email Protection Protects your computer against the threats that you may receive through email attachments. You can use the Email Antivirus Scan option and the AntiSpam option to configure your email program for protection against viruses and other security threats.
Customizing protection features Feature summary Instant Messenger Scan Scans for and detects viruses in instant messenger attachments. Scans the instant messenger attachments for the supported instant messenger programs that were on your computer when you installed your product. New instant messenger programs must be configured in Instant Messenger Scan window. Heuristic Protection Detects the new and the unknown viruses by analyzing an executable file's structure, and behavior.
Customizing protection features Feature summary 447 About spyware and other security risk protection features Spyware and other security risk protection features provide protection against the latest security risks, such as spyware and adware. These features scan for existing risks and blocks new risks before they can be installed on your computer.
Customizing protection features Feature summary Security risk assessment If you are unsure how to handle a program that is classified as a security risk, you can view the security risk assessment. The security risk assessment describes the level of impact that a security risk program has on your computer. You can access the security risk assessment from the Risk Details window. This window is available when the scan results require input before it process a security risk program.
Customizing protection features Feature summary Trust Control 449 Detects when your computer connects to a new network. You can then allow or block connections from all computers that are connected to that network. See “About Smart Firewall Trust Control settings” on page 241. About spam filtering features With the increase in usage of email, many users receive a number of unwanted and unsolicited commercial email messages that are known as spam.
Customizing protection features Feature summary Allowed and Blocked Lists 1 1 1 1 Uses a user-defined address list to expedite the scanning of email. Accepts all email messages from senders in the Allowed List. Treats all email messages from senders in the Blocked List as spam. Allows and blocks email messages from entire domains as well as individual email addresses. See “About Norton AntiSpam settings” on page 285.
Customizing protection features Feature summary 451 Norton Online Family helps parents to get a better understanding of what children do online, so that they can better protect and guide them. You can use the Online Family icon at the bottom of the main window to create your Norton Online Family account. The icon may not be available with some versions of Norton Internet Security. In such case, you may not be able to access Norton Online Family options.
Customizing protection features About turning off automatic features 1 1 w Monitor and manage the Internet search that your children perform. Define House Rules for your children based on their age and maturity. Norton Online Family may not be available with some versions of Norton Internet Security. In such case, you may not be able to access the Norton Online Family options.
Customizing protection features About turning off automatic features 453 In some cases, Auto-Protect might warn you about a virus-like activity that you know are not the work of a virus. If you perform such an activity and want to avoid the warning, you can turn off Auto-Protect. If you have set a password for settings, Norton Internet Security asks you for the password before you can view or change the settings.
Customizing protection features About turning off automatic features To control these spam mails you can use the spam filtering. By default, spam protection remains active. If for any reason you want to disable it, you can turn it off from within the program itself. w Turning off Norton AntiSpam increases your exposure to receive unsolicited email messages. To turn off spam filtering 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the Network tab.
Customizing protection features About turning off automatic features w 455 Norton Community Watch collects and submits detailed data about the Norton-specific errors and components only. It does not collect or store any personal information of any user. You can use Security History to review the information that has been sent to Symantec. To turn off or turn on Norton Community Watch 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the General tab.
Customizing protection features About turning off automatic features 2 In the Settings window, click the Network tab. 3 In the left pane, click Intrusion Prevention. 4 In the Intrusion Prevention row, move the On/Off switch to the right to the Off position. 5 In the left pane, click Smart Firewall. 6 In the Smart Firewall row, move the On/Off switch to the right to the Off position. You may need to scroll the window to see the option. 7 In the Settings window, click Apply.
Customizing protection features About turning off automatic features 457 To turn off Web settings 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the Web tab, and do the following: 1 In the Browser Protection section, in the Browser Protection row, move the On/Off switch to the right to the Off position.
Customizing protection features About customizing settings and options 2 In the Settings window, click the Web tab, and do the following: 1 In the Browser Protection section, in the Browser Protection row, move the On/Off switch to the left to the On position. 1 In the Download Intelligence section, in the Download Intelligence row, move the On/Off switch to the left to the On position. 1 In the Identity Safe section, in the Identity Safe row, move the On/Off switch to the left to the On position.
Customizing protection features About customizing settings and options 459 Configuring Norton Internet Security settings The default Norton Internet Security settings provide a safe, automatic, and efficient way to protect your computer. If you want to change or customize your protection, you can access most features from the main window. If you want to control additional settings, such as Trust Control or Program Control, you can use the Norton Internet Security Settings window.
Customizing protection features About customizing settings and options 2 In the Settings window, configure your settings in the following tabs: Computer Lets you configure how you want Norton Internet Security to scan your computer for viruses and other security threats. You can also configure Norton Internet Security to obtain regular updates for complete protection of your computer. You can include additional protection to your computer by using the most recent definitions from Cloud during scans.
Customizing protection features About customizing settings and options Network Lets you configure how you want Norton Internet Security to monitor your network activities. You can protect your computer against the threats that you might receive through email attachments, instant messaging program attachments. You can also configure the communication port that Norton products use to communicate with each other. In addition, you can protect your computer against intrusion attempts and unauthorized traffic.
Customizing protection features About customizing settings and options Web Lets you safeguard your sensitive information and online transactions. You can manage your login information, such as email login credentials and your financial information, such as credit card details. You can also manage other personal information, such as social security number or driver's license number. You can also safely browse the Internet.
Customizing protection features About customizing settings and options General 463 Lets you configure the appearance and security of your product. In addition, you can configure how Norton Internet Security submits risk details to Symantec. You can specify your proxy settings to obtain definition updates. You can also configure Silent Mode, Performance Monitoring, Idle Time Out duration, Monthly Report, and other miscellaneous options.
Customizing protection features About customizing settings and options scan your computer for viruses and other security threats. Your options are: AntiVirus and SONAR Exclusions AntiVirus and SONAR Exclusions options let you specify the items that Norton Internet Security excludes from its scans. Scans and signatures are some items that you can exclude from scanning. AntiVirus and SONAR Exclusions options also let you choose which categories of risks you want Norton Internet Security to detect.
Customizing protection features About customizing settings and options Computer Scan Norton Internet Security lets you run different types of scans to detect and prevent any virus infection on your computer. You can use the various Computer Scan options to select the scan type, file types to scan, and the scan schedule. You can also specify scanning of compressed files and Microsoft Office documents. You can perform a Full System Scan. You can also individually scan drives, folders, or files.
Customizing protection features About customizing settings and options Real Time Protection
Customizing protection features About customizing settings and options Real Time Protection option protects your computer by continuously checking for viruses and other security risks. You can use the Real Time Protection options to control the scanning and monitoring of your computer. Your options are: 1 Antispyware 1 Antispyware protects your computer against the security risks that can compromise your personal information and privacy.
Customizing protection features About customizing settings and options 1 SONAR Protection Symantec Online Network for Advanced Response (SONAR) provides you with real-time protection against threats by proactively detecting unknown security risks on your computer. SONAR identifies emerging threats based on the behavior of applications. SONAR Protection is quicker than the traditional signature-based threat detection techniques.
Customizing protection features About customizing settings and options 1 Early Launch Anti-Malware Protection This feature provides better protection by running all the necessary components of Norton Internet Security that block malware intrusion when you start your computer. This feature is w available only in Windows 8.
Customizing protection features About customizing settings and options Updates
Customizing protection features About customizing settings and options Norton Internet Security protects your computer from vulnerabilities through the latest program and definition updates. Definition updates contain the information that lets Norton Internet Security recognize and alert you to the presence of a specific virus or security threat. You can use the options in the Updates section to obtain the latest virus definitions and keep your computer secure from the latest security threats.
Customizing protection features About customizing settings and options latest available version and prompts you for free installation. To get the latest version, this option must be turned on. This feature may not w work in some versions of Norton Internet Security. 1 Smart Definitions Activates the Core Set virus definitions which contain the most important virus definitions that are required for latest security threats as viewed by Symantec.
Customizing protection features About customizing settings and options 1 473 Apply updates only on reboot Lets you choose how the program updates obtained by Automatic LiveUpdate need to be applied to your computer. Certain program updates may require you to restart your computer for the updates to complete. When you turn on this option, program updates that require system restart are automatically applied the next time you restart your system.
Customizing protection features About customizing settings and options Your options are: Intrusion Prevention
Customizing protection features About customizing settings and options Intrusion Prevention scans all the network traffic to and from your computer and compares this information against a set of attack signatures. Attack signatures contain the information that identifies an attacker's attempt to exploit a known vulnerability in the operating system or in a program. If the information matches an attack signature, Intrusion Prevention blocks the traffic from the suspicious computer.
Customizing protection features About customizing settings and options Message Protection
Customizing protection features About customizing settings and options Message Protection protects your computer against the threats that you may receive through email attachments. You can use the Email Antivirus Scan option, the AntiSpam option, and the Protected Ports Settings option to configure your email program for protection against viruses and other security threats. Email Antivirus Scan protects you from the threats that are sent or received in email attachments.
Customizing protection features About customizing settings and options 1 1 your computer with which you want to integrate Norton AntiSpam. Send feedback about any misclassified email message to Symantec for analysis. Classify the spam email messages effectively. Instant Messenger Scan option lets you customize the scanning of the files the instant messenger programs receive. You can select the supported instant messenger programs from which you may receive files.
Customizing protection features About customizing settings and options Network Security Settings 479
Customizing protection features About customizing settings and options The Network Cost Awareness option lets you set up policies and restrict the Internet usage of Norton Internet Security. You can define the amount of network bandwidth that Norton Internet Security can use. The Network Security Map option provides a pictorial representation of the devices on the network to which your computer is connected.
Customizing protection features About customizing settings and options 1 1 1 related to the computers or devices that are on your network. Grant or deny permissions to the networked devices to access your computer. Add or Remove any device in the Network Security Map. Change the trust control level for a particular Network address or an IP address.
Customizing protection features About customizing settings and options Smart Firewall Smart Firewall monitors communications between your computer and the other computers on the Internet. It also protects your computer from common security problems. You can use the Smart Firewall options to customize how the firewall monitors and responds to inbound communications and outbound communications.
Customizing protection features About customizing settings and options Your options are: Browser Protection The Browser Protection feature checks for browser vulnerabilities in the following browsers: 1 1 1 Internet Explorer 7.0 or later Firefox 10.0 or later Chrome 17.0 or later You must turn on the Browser Protection option to enable this feature.
Customizing protection features About customizing settings and options Identity Safe The Identity Safe feature in Norton Internet Security lets you save and protect your logins.
Customizing protection features About customizing settings and options By using General settings, you can do the following: 1 Schedule your Norton Tasks. 1 Configure the General settings of your product. 1 Monitor the performance of your system. 1 Configure the security settings. 1 Customize the Silent Mode settings.
Customizing protection features About customizing settings and options Your options are: Norton Tasks
Customizing protection features About customizing settings and options Lets you configure your Norton Tasks settings. Your options are: 1 1 Automatic Resume Delay From Sleep or Hibernation This option delays the automatic background tasks for a specific duration even if your computer is idle for that period. You can specify Automatic Resume Delay duration for a period of one minute to 20 minutes. By default, the Automatic Resume Delay From Sleep or Hibernation option is set to 10 minutes.
Customizing protection features About customizing settings and options defragment your boot volume or the local disk that contains the boot volume when your computer is idle. 1 When the option is turned on, Norton Internet Security automatically schedules the optimization after you install an application on your computer. Optimization improves the performance of your computer by defragmenting the fragmented parts of the disk.
Customizing protection features About customizing settings and options Other Settings 489
Customizing protection features About customizing settings and options Lets you configure the miscellaneous settings. Your options are: 1 Power Saving Mode Lets you save your battery power by suspending the Norton Tasks when your computer is on battery power. 1 By default, this option is turned on. Monthly Report Lets you view the Monthly Report for the last 30 days. 1 You can configure the Monthly Report options to remind you to view Monthly Report.
Customizing protection features About customizing settings and options 1 most recent definitions. Norton Community Watch Lets you submit selected security and application data to Symantec for analysis. Symantec analyses the data to determine any possible security risks and provides you the useful statistical information about the applications. The Detailed Error Data Collection option lets you allow or deny some of the detailed data submissions.
Customizing protection features About customizing settings and options 1 Remote Management Lets you remotely view your device’s security status and fix some security issues by using Norton Management, Norton One, and Norton Studio. Norton Sudio is an app that works on Windows 8. When you turn on Remote Management, Norton Internet Security publishes details such as your subscription status, security status of your device, and other details to the Norton Management, Norton One, and Norton Studio app.
Customizing protection features About customizing settings and options 1 Parental Controls have not been installed Lets you install Norton Online Family. Norton Online Family is a parental control application that helps you protect your child from Internet dangers and online predators. It lets you grant permission for your child to access Web sites based on the age and maturity of your child. You can use the Click here to install link to install Norton Safety Minder and to configure Norton Online Family.
Customizing protection features About customizing settings and options Performance Monitoring
Customizing protection features About customizing settings and options Lets you monitor the performance of your computer. 1 Performance Monitoring When you turn on the Performance Monitoring option, Norton Internet Security monitors the CPU usage and memory usage of your computer. You can also monitor the important system activities that you performed for the last three months in the Performance window.
Customizing protection features About customizing settings and options 2 2 Log Only, or the Off mode. The Details & Settings link in the notification alert lets you view additional details about the resource consumption by the program in the File Insight window. Resource Threshold Profile for Alerting Lets you configure the resource threshold profile for displaying performance alerts.
Customizing protection features About customizing settings and options 2 Alert for High-Usage of: 2 CPU 2 When this option is turned on, Norton Internet Security detects and notifies you with the details of increased usage of the CPU resource by any program or process. Memory 2 When this option is turned on, Norton Internet Security detects and notifies you about the increased usage of memory by any program or process.
Customizing protection features About customizing settings and options 2 about the increased usage of handles by any program or process. Program Exclusions Lets you select specific programs to exclude from appearing in performance alerts.
Customizing protection features About customizing settings and options Product Security 499
Customizing protection features About customizing settings and options Lets you protect Norton Internet Security from unauthorized changes. Your options are: 1 Non-Admins Access to Settings Lets you access and configure all the options in the Settings window from a non-admin user account as well. 1 1 By default, this option is turned off. You need to log in to your computer as an administrator to turn on this option.
Customizing protection features About customizing settings and options to view or configure your product settings. However, if you forget your settings password, you can reset the password in the window that appears when you choose to uninstall Norton Internet Security. You do not need to uninstall the product to reset your password. You can use the reset settings password option in the uninstall preference window to reset your password.
Customizing protection features About customizing settings and options Silent Mode Settings
Customizing protection features About customizing settings and options Lets you turn on or turn off Silent Mode. Your options are: 1 Silent Mode 1 When you turn on the Silent Mode option, Silent Mode is enabled for a specified duration. Norton Internet Security suppresses all alerts and suspends the background activities for the duration that you specify.
Customizing protection features About customizing settings and options 2 turns on Quiet Mode. When Quiet Mode is turned on, Norton Internet Security suppresses the background activities but continues to display alerts and notifications. Media Center TV Recording When you use the Media Center application to record a TV program, Norton Internet Security detects the activity, and automatically turns on Quiet Mode.
Customizing protection features About customizing settings and options 2 505 User-Specified Programs When you run an application that is listed in the User-Specified Programs list, Norton Internet Security detects the activity, and automatically turns on Quiet Mode. When Quiet Mode is turned on, Norton Internet Security suppresses the background activities but continues to display alerts and notifications. You can configure the list of programs for which you want to turn on Quiet Mode.
Customizing protection features About customizing settings and options w You cannot run System Restore on your computer when Norton Product Tamper Protection is turned on. You must temporarily turn off Norton Product Tamper Protection to run a successful System Restore. Turning off or turning on Norton Product Tamper Protection Norton Product Tamper Protection protects the Norton Internet Security files from an attack or modification by any virus or other unknown threat.
Customizing protection features About customizing settings and options 507 To turn on Norton Product Tamper Protection 1 In the Norton Internet Security main window, click Settings. 2 In the Settings window, click the General tab. 3 In the left pane, click Product Security. 4 In the Norton Product Tamper Protection row, move the On/Off switch to the left to the On position. 5 Click Apply, and then click OK.
Customizing protection features About customizing settings and options w The reset settings password option appears in the Select your Uninstall Preference window only when the Settings Password Protection option is turned on. You can turn off the Settings Password Protection option if you no longer require password protection for your Norton Internet Security Settings.
Customizing protection features About customizing settings and options 509 6 In the dialog box that appears, in the Password box, type a password. 7 In the Confirm Password box, type the password again. 8 Click OK. 9 In the Settings window, click OK. Turning off Norton Internet Security Settings password You can protect your Norton Internet Security Settings with a password using the Settings Password Protection option.
Customizing protection features About customizing settings and options your Norton Internet Security Settings password using the reset settings password option in the Select Uninstall Preference window. To access the Select Uninstall Preference window, you must choose to uninstall Norton Internet Security. However, you need not uninstall the product to reset your Settings password.
Customizing protection features About customizing settings and options 511 4 At the bottom of the Select Your Uninstall Preference window, click reset settings password. 5 In the dialog box that appears, in the Reset Password Key box, type the randomly generated key that is displayed against Reset Password Key. 6 In the New Password box, type the new password. 7 In the Confirm New Password box, type the new password again. 8 Click OK.
Customizing protection features About customizing settings and options Norton Account. Your device needs to be connected to the Internet to use Remote Management feature. When the Remote Management option is turned on, Norton Internet Security publishes details such as your Norton Internet Security subscription status, current security state of your device, and other details to the Norton Management, Norton One, and Norton Studio app.
Customizing protection features About customizing settings and options 1 1 1 2 Timestamp of last Quick Scan 2 Timestamp when stats were published 513 View health states of different components of your device 2 Overall product health 2 Computer category health 2 Network category health 2 Web category health Fix the following items: 2 Firewall 2 Auto-Protect 2 Scan incoming emails 2 Scan outgoing emails 2 Antispyware 2 Intrusion Prevention 2 SONAR 2 Antiphishing 2 Browser Protect
Customizing protection features About customizing settings and options By default, this feature is disabled unless you register your Norton Internet Security with your Norton Account. When the Remote Management option is turned on, Norton Internet Security sends details related to your Norton product to Norton Management, Norton One, and Norton Studio app.
Finding additional solutions 9 This chapter includes the following topics: 1 Finding the version number of your product 1 Finding the End-User License Agreement 1 About upgrading your product 1 About Norton Autofix 1 Staying informed about protection issues 1 About Support 1 About uninstalling Finding the version number of your product If you want to upgrade your Norton product or want to reach the customer support for assistance, you must know your product version number.
Finding additional solutions Finding the End-User License Agreement Finding the End-User License Agreement End-User License Agreement (EULA) is a legal document that you agree to while installing the product. EULA contains information such as the restriction on sharing or usage of the software, the user rights on the software, and the support information. You can read the EULA to learn more about the following information: 1 1 The usage policies of Norton Internet Security.
Finding additional solutions About upgrading your product 517 > Updates > Automatic Download of New Version > On. If you choose to install the latest version of the product, Norton Internet Security downloads and seamlessly installs the latest version. Ensure that you have saved all your important data such as pictures and financial records before you install the new version of the product.
Finding additional solutions About upgrading your product The upgrade process might not work if your Web browser is incompatible to communicate with the Symantec servers. w Your product must be activated and you need an Internet connection to check and install new product version. Checking for a new version of the product You can upgrade your product to the latest version if you have an active subscription.
Finding additional solutions About Norton Autofix w 519 Your product must be activated and you need an Internet connection to check if a new version is available and install new version of the product. To check for a new version of the product 1 In the Norton Internet Security main window, click Support. 2 In the Support drop-down menu, click New Version Check. This option is available only if your product is activated.
Finding additional solutions About Norton Autofix When you click the Get Support option in the Support drop-down menu, Norton Internet Security checks your Internet connection. To access Norton Autofix, ensure that your computer is connected to the Internet. If you use a proxy server to connect to the Internet, you must configure the proxy settings of Norton Internet Security. See “Configuring Network Proxy Settings” on page 78.
Finding additional solutions Staying informed about protection issues 521 To solve a problem if your computer is unable to connect to the Internet 1 In the Norton Internet Security main window, click Support. 2 In the Support drop-down menu, click Get Support. 3 Follow the on-screen instructions in the Checking Your Connection window to attempt to correct your connection issue. 4 In the Checking Your Connection window, click Retry.
Finding additional solutions Staying informed about protection issues 1 1 w Newsletter to which you can subscribe. Protection blog that lets you post your own comments and view comments from experts. The Symantec Web site is constantly updated and enhanced, so the available resources may vary. To stay informed about protection issues 1 Open your Web browser, and go to the following URL: http://www.symantec.com 2 In the Symantec Web site, click Norton.
Finding additional solutions About Support 523 About Support If you have purchased Norton Internet Security, you can access Support from the product. w Support offerings may vary based on the language or product. About Norton Support Web site The Norton Support Web site provides a full range of self-help options.
Finding additional solutions About Support contact the technical support team in the following ways: Live Chat Chat in real time with a support representative. For more complex technical issues, chat offers the option to allow a support representative to connect remotely to your computer and resolve your problem. Email Submit your question on our Web site and receive a response by email. Email support has a slower response time than chat or phone.
Finding additional solutions About Support 525 also use the Search Support box to find solution using a keyword. Norton Support Web site also contains useful links to the product manual, the Norton Account, the Norton Forum, and the spyware help under Additional Resources. To use the Norton Support Web site 1 In the Norton Internet Security main window, click Support. 2 In the Support drop-down menu, click Get Support. 3 Follow the on-screen instructions.
Finding additional solutions About Support http://www.norton.com/support Getting support by phone When you click the Get Support option in the Support drop-down menu, Norton Autofix performs a Quick Scan and should repair your computer problems. However, if the problem persists, you can use the Open Support Web Site option to go to the Norton Support Web site for help by telephone, email, chat, or forum.
Finding additional solutions About Support 527 4 Click the Contact Us option at the bottom of the Web page and follow the on-screen instructions. Support policy Symantec recommends that you have the latest version of the product, as it contains new and enhanced features for better protection against security threats. Current help and support for your Norton product can be found at the following URL: www.norton.
Finding additional solutions About Support www.norton.com/support If you are a Norton One Premium Member, go to the following Norton One support Web site for information on this topic: https://one.norton.com/support ClubNorton ClubNorton is your one-stop resource center for Internet security. As a Norton customer, Symantec wants to make your experience with your computer safe, enjoyable, and productive.
Finding additional solutions About uninstalling 529 About uninstalling To remove your Symantec product from your computer, use the Add/Remove Programs option in the Windows Control Panel. You must restart your computer after uninstalling the product, so ensure that you do not have any other programs running while you follow this procedure. Uninstalling Norton Internet Security You can remove Norton Internet Security in the following ways: 1 From Windows Control Panel. 1 w From the Start menu.
Finding additional solutions About uninstalling w Your computer must be connected to the Internet to avail this option. Norton Internet Security does not offer to leave the Norton Toolbar if you upgrade your product to the latest version or choose to reinstall another Norton product. In addition, the Norton Toolbar installation is available only if the operating system of your computer is English.
Finding additional solutions About uninstalling 531 4 In the page that appears, under Select Your Uninstall Preference, click one of the following: I plan to reinstall a Lets you retain your settings, Norton product. Please passwords, and preferences for leave my settings behind. Norton features before you uninstall Norton Internet Security. Select this option if you want to reinstall Norton Internet Security or another Norton product. Please remove all user data.
Finding additional solutions About uninstalling To uninstall Norton Internet Security from the Start menu 1 Do one of the following: 1 On the Windows taskbar click Start > All Programs > Norton Internet Security > Uninstall Norton Internet Security. 1 In Windows 8, go to Start screen and then click Uninstall Norton Internet Security. 2 In the page that appears, under Select Your Uninstall Preference, click one of the following: I plan to reinstall a Lets you retain your settings, Norton product.
Finding additional solutions About uninstalling 533 5 Do one of the following: 1 Click Restart Now (recommended) to restart the computer. 1 Click Restart Later to restart the computer later. Norton Internet Security is not fully uninstalled until you restart your computer. See “About uninstalling” on page 529.
Finding additional solutions About uninstalling
Index A about customer support 523 accessing Facebook Scan 133 accessing Norton Internet Security scans Computer Scan 133 Reputation Scan 133 Actions window deleting security risks 421 performing actions 421 restoring security risks 421 submission, items to Symantec 421 activation about 13 alerts 14 Norton Account 32 problems 17 procedure 14 troubleshooting 17 Add Rule Wizard opening 224 using 225 Address Book Exclusions setting 288 addresses adding allowed 289 adding blocked 291 importing allowed 289 Adv
Index Antispyware managing using the main window 283 Application Ratings check trust level 118 Scan Performance Profiles 120 attack signatures 272 attacks network 212 attention infected files 208 infected items 140 resolve any items 140 Attention Required about 140 resolving the risk 140 Auto-Protect functions 443 notifications 201 turning on and off 452 automatic features disabling 452 Automatic LiveUpdate turning off or turning on 72 Automatic Program Control about 217 turning on and off 219 B back
Index CPU usage viewing 95 Creating custom scans adding files 141 adding folders 141 Crimeware Protection turning off or turning on 456 custom scan configure scan options 143 select items 142 custom scans about 141 creating 141 deleting 145 editing 144 particular area 141 running a custom scan 144 scan frequently 141 schedule the custom scan 141 scheduling 146, 149 customer support about 523 using 524 customizing Allowed List 289 Blocked list 291 D definition status 71 definition updates 65 obtaining 75 d
Index features (continued) security risk protection 447 Feedback Norton AntiSpam 295 file extensions of infected files 208 filter importing allowed 289 Web Query 296 filtering email 285 identifying email senders 289, 291 SSL 284 web-based 296 firewall rules about 214 adding 224 changing the order of 235 creating 217, 225 default 215 modifying 233 processing order 214, 235 removing 237 turning on and off 236 Full Screen Detection about 182 Full System Scan running Full System Scan 136 scheduling 148 G
Index import logins 356 Insight Network about 152 cloud computing 152 Insight Network scan 152 Quick Scan 152 scan 152 shortcut menu scan 152 Single File Scan 152 Insight Protection turning off 154 turning on 154 installation problems 49, 56 Instant Messenger virus protection 443 integration with email clients 286 integration with email programs 293 Intrusion AutoBlock blocking computers permanently 277 turning on and off 275 unblocking computers 276 Intrusion Prevention about 272, 448 exclusion list 277 t
Index Manual Repair reviewing remaining risks in 208 Manual Repair window reviewing remaining risks in 136, 138 Media Center Extender Silent Mode 186 Memory graph about 94 obtaining historical data 96 Miscellaneous Settings about 484 Monthly Report about 122 viewing 123 N Network changing trust level 316 discovering devices 309 editing details 316 forming 309 joining 309 managing 301 Network Cost Awareness about 326 defining bandwidth 328 turning off 327 turning on 327 Network Proxy Settings about 76
Index Norton Community Watch (continued) turning off or turning on 454 Norton Firewall Diagnosis about 255 Norton Insight about 112 Files of Interest 115 refreshing trust level 115 trusted files 112 viewing processes 115 Norton Internet Security about securing 507 activating 14 Allowed and Blocked lists 449 background jobs 104 EULA 516 icon 61 main window 18 new version 518 password 508–509 protecting 509 registering 36 securing 508 settings 459, 473 shortcut menu 63 starting from the DOS command prompt 61
Index O Office documents embedded objects 181 scanning office documents 181 turn on or turn off 182 virus macros 181 One Click Support using 520 Online transactions identity theft 344 Optimization about 101 boot volume 102 Options Client Integration 286 customizing 458 password protection 443 Smart Firewall 238 Smart Firewall Advanced Settings 242 Smart Firewall Program Control 239 Smart Firewall Trust Control 241 P Parental Control settings 450 password changing 390 editing 368 for Settings 459 savi
Index Program Control (continued) turning on and off 219 Program rules adding 224 changing 233 removing 237 program updates 65 programs adding to Program Control 221 configuring Internet access 224 creating firewall rules 224 removing from Program Control 222 protection preparing for emergencies 125 system scans 136 protection settings configuring 126 ensuring 126 turning on 126 proxy server configuring 78 settings 76 Pulse Updates about 75 using 75 Q Quarantine adding an item 439 items, submitting for an
Index risks intrusions 212 port scans 212 rules changing 225, 233 creating 224–225 Running custom scans scanning required files 144 scanning required folders 144 running Full System Scan Reputation Scan 159 scanning entire computer 136 running Quick Scan fast scan 137 Insight Network Quick Scan 137 Quick Scan 137 Reputation Scan 160 S Safe Surfing about 331 Safe Web turning off 342 turning on 342 scan at the command prompt command line scanning 150 Scan Complete appearing after a scan 208 Scan Comple
Index Security History (continued) recent alert history 408 searching 434 security risks 408 submission, items to Symantec 408 suspicious email 408 traffic alerts 408 viewing items 408 viewing quarantined items 408 security protection about 448 security risks about 282, 447 adding to Quarantine 439 assessment 447 attacks 212 found by Auto-Protect 199, 201 managing protection using the main window 282 other programs 282 port scans 212 protection features 447 restoring 447 restoring from Quarantine 439 scan
Index startup files 200 startup items delaying and running 100 disabling or enabling 99 Startup Manager about 97 delaying and running delayed items 100 disabling or enabling startup items 99 stopping spam blocking 453 submission, items to Symantec 441 subscription maintaining 527 product updates 71 summary product features 443 Supervisor user account creating firewall rules 217 Support AutoFix Scan 520 Self Help 523 solving problems 520 worldwide service 527 Support policy 527 Symantec Security Respon
Index version number checking 515 virus protection about 443 system scans 136 updates 443 viruses automatic protection 443 descriptions 443 unknown 443 Vulnerability Protection about 280–281 viewing programs 281 W Web pages launching 371 protection 332 reporting 334 Web Query about 296 turning off 297 turning on 297 Web Settings about 482 wireless network viewing status 323 Worm Blocking threats found by 206 worms found by Worm Blocking 206 in email messages 206 547
foo Norton from Symantec products protect consumers from traditional threats with antivirus, antispam, and Spyware Protection. They also protect against bots, drive-by downloads, and identity theft, and are light on system resources. In addition, Symantec provides services such as online backup and PC Tuneup, and is a trusted source for family online safety.